skip to main content
10.1145/1095714.1095758acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Practical computer security: a new service course based upon the national strategy to secure cyberspace

Published: 20 October 2005 Publication History

Abstract

The National Strategy to Secure Cyberspace calls upon IT professionals to help empower all Americans to secure their own connections to cyberspace as part of the National security effort. Specifically, it is a call for training the general population (meaning non-IT professionals). This paper describes a pilot syllabus for a course aimed at teaching non-computing majors the fundamentals of computer security, and so meets this call of the National Strategy. It will be offered as part of the university's General Education program, at the upper division level. We discuss the reason for the course, the selection of topics to include, the educational approach to be taken with non-technical students, and the resulting characteristics desired for our graduates.

References

[1]
Chautauqua Field Center Directors and the Regional Centers (University of Pittsburgh). Chautauqua Short Courses for College Teachers. (2005). Retrieved March 1, 2005 from <http://www.engr.pitt.edu/chautauqua/>
[2]
Ciampa, Mark. (2004). Security Awareness: Applying Practical Security in Your World. Boston: Thomson Course Technology.
[3]
Department of Homeland Security. National Strategy to Secure Cyberspace. (2003). Retrieved March 1, 2005 from <http://www.whitehouse.gov/pcipb/>
[4]
Easttom, Chuck. (2006). Computer Security Fundamentals. Upper Saddle, NJ: Pearson Education, Inc.
[5]
Hauben, Michael and Hauben, Ronda. (1997). Netizens: On the History and Impact of Usenet and the Internet. Los Alamitos, CA: IEEE Computer Society Press.
[6]
Jaques, Robert. vnunet.com 01 Feb 2005, http://www.vnunet.com/vnunet/news/2126635/cost-malware-soars-166bn-2004
[7]
McMahon, David. (2000). Cyber Threat: Internet Security for Home and Business. Toronto: Warwick Publishing, Inc.
[8]
Solomon, Michael G. and Chapple, Mike. (2005). Information Security Illuminated. Sudbury, MA: Jones and Bartlett Publishers.
[9]
United States Computer Emergency Readiness Team, http://www.us-cert.gov.
[10]
Volonino, Linda and Robinson, Stephen R. (2004). Principles and Practice of Information Security: Protecting Computers from Hackers and Lawyers. Upper Saddle River, NJ: Pearson/Prentice Hall.

Cited By

View all
  • (2008)A case study on computer security for non-expert computer userProceedings of the 46th annual ACM Southeast Conference10.1145/1593105.1593201(361-365)Online publication date: 28-Mar-2008

Index Terms

  1. Practical computer security: a new service course based upon the national strategy to secure cyberspace

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGITE '05: Proceedings of the 6th conference on Information technology education
    October 2005
    402 pages
    ISBN:1595932526
    DOI:10.1145/1095714
    • General Chair:
    • Rob Friedman
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 October 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. education
    2. model syllabi
    3. security

    Qualifiers

    • Article

    Conference

    SIGITE05
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 176 of 429 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2008)A case study on computer security for non-expert computer userProceedings of the 46th annual ACM Southeast Conference10.1145/1593105.1593201(361-365)Online publication date: 28-Mar-2008

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media