skip to main content
10.1145/1095714.1095760acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

Web-based interactive courseware for information security

Published: 20 October 2005 Publication History

Abstract

Interactive courseware encourages student participation and active learning. Prior research and teaching experience has shown that IT students prefer to learn information security in a hands-on manner. How do we offer information security as a distance learning course while give students the similar hands-on teaching and learning style as we do in a traditional classroom or lab? This paper discusses our experience in developing Web-based multimedia and interactive courseware for an undergraduate information security course. The courseware is based on a simple yet powerful software tool called MICS (Multimedia and Interactive Courseware Synthesizer), designed for generating multimedia and interactive courseware for science and engineering students. We report in this paper our experience in designing such a course development tool and in using the courseware in our IT curricula.

References

[1]
Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org/, August 2003.
[2]
John Viega and Gary McGraw, Building Secure Software, Addison Wesley, 2002.
[3]
James A. Whittaker and Herbert H. Thompson, "How to Break Software Security", Addison Wesley, 2003.
[4]
Defense Information Systems Agency, Cyber Protect: Interactive Training Exercise, version 1.1, July 1999, http://iase.disa.mil/ETA.
[5]
G. Vigna, "Teaching Hands-On Network Security: Testbeds and Live Exercises", Journal of Information Warfare (2003) 2, 3: 8 -- 24.
[6]
Source: http://www.cert.org/tech_tips/security_tools.html
[7]
Matt Bishop, "Computer Security: Art and Science", Addison Wesley, 2003. ISBN: 0-201-44099-7.
[8]
National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part I: Introduction and General Model", Version 2.1, CCIMB-99-031, August 1999.
[9]
{CC2 99} National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part II: Security Function Requirements", Version 2.1, CCIMB-99-031, August 1999.
[10]
{CC3 99} National Institute of Standards and Technology, "Common Criteria for Information Technology Security Evaluation, Part III: Security Assurance Requirements", Version 2.1, CCIMB-99-031, August 1999.
[11]
{CEC 91} Commission of the European Communities, "Information Technology Security Evaluation Criteria", Version 1.2, 1991.
[12]
{DOD 85} Department of Defense, "Trusted Computer System Evaluation Criteria", DOD 5200.28-STD, December 1985.
[13]
C.E. Landwehr, "Formal Models for Computer Security", ACM Computing Surveys, Vol. 13, No. 3, 1981. pp. 247 -- 278.
[14]
National Institute of Standards and Technology, "Security Requirements for Cryptographic Modules", PIPS PUB 140-2, May 2001.
[15]
Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", NIST Special Publication 800-55, National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf. July 2003.
[16]
Michael Howard and David LeBlanc, "Writing Secure Code, Microsoft Press, 2003.
[17]
J. A. Wang, Security Testing in Software Engineering Courses, Proceedings of Frontiers in Education Conference, Session F1C, IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5. October 2004, Savannah, Georgia.
[18]
J. A. Wang, Information Security Practice, XanEdu Publishing Services, ISBN 1-59399-044-8, May 2003.
[19]
J. A. Wang, "Information Security Models and Metrics", in Proceedings of 43rd ACM Southeast Conference, Volume 2, pp. 178 - 184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA.
[20]
Susan Gerhart, "Driving Home the Buffer Overflow Problem: A Training Module for Programmers and Managers", Embry-Riddle Aeronautical University, 2002.

Cited By

View all
  • (2019)Design of Multimedia Interactive Courseware Based on FlashJournal of Physics: Conference Series10.1088/1742-6596/1345/5/0520021345(052002)Online publication date: 28-Nov-2019
  • (2017)Folk PedagogyProceedings of the 2017 ACM Conference on International Computing Education Research10.1145/3105726.3106192(145-154)Online publication date: 14-Aug-2017
  • (2014)Applying Protection Motivation Theory to Information Security Training for College StudentsJournal of Information Privacy and Security10.1080/15536548.2013.108456729:1(47-67)Online publication date: 7-Jul-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGITE '05: Proceedings of the 6th conference on Information technology education
October 2005
402 pages
ISBN:1595932526
DOI:10.1145/1095714
  • General Chair:
  • Rob Friedman
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. active learning
  2. information security
  3. interactivity

Qualifiers

  • Article

Conference

SIGITE05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Design of Multimedia Interactive Courseware Based on FlashJournal of Physics: Conference Series10.1088/1742-6596/1345/5/0520021345(052002)Online publication date: 28-Nov-2019
  • (2017)Folk PedagogyProceedings of the 2017 ACM Conference on International Computing Education Research10.1145/3105726.3106192(145-154)Online publication date: 14-Aug-2017
  • (2014)Applying Protection Motivation Theory to Information Security Training for College StudentsJournal of Information Privacy and Security10.1080/15536548.2013.108456729:1(47-67)Online publication date: 7-Jul-2014
  • (2011)The Use of Computer Games in EducationHandbook of Research on Improving Learning and Motivation through Educational Games10.4018/978-1-60960-495-0.ch002(29-50)Online publication date: 2011
  • (2008)It/cs workshopProceedings of the 9th ACM SIGITE conference on Information technology education10.1145/1414558.1414567(23-30)Online publication date: 16-Oct-2008
  • (2007)An application of games‐based learning within software engineeringBritish Journal of Educational Technology10.1111/j.1467-8535.2007.00706.x38:3(416-428)Online publication date: 25-Apr-2007
  • (2006)StingrayProceedings of the 7th conference on Information technology education10.1145/1168812.1168827(53-58)Online publication date: 19-Oct-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media