skip to main content
article

Teaching the undergraduate CS Information Security Course

Published: 01 June 2006 Publication History

Abstract

This paper presents a lab based approach to teaching the undergraduate CS Information Security course. Given the magnitude of real and potential loses associated with security breaches, employers increasingly expect graduates of CS programs to have an understanding of information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses and worms. The labs and lectures are intended to instruct students in the inspection and protection of information assets, and detection of and reaction to threats to information assets.

References

[1]
Austin, Robert D. and Christopher A. R. Darby (2003), "The Myth of Secure Computing," Harvard Business Review, 81(6), p.120--126.
[2]
Aycock, John (2005), http://pages.cpsc.ucalgary.ca/~aycock/, University of Calgary.
[3]
Dunigan, Terry (2004), http://www.cs.utk.edu/~dunigan/cns04/, University of Tennessee.
[4]
Koc, Cetin Kaya (2004), http://security.ece.orst.edu/koc/ece575/, Oregon State University.
[5]
Sophos (2003), http://www.sophos.com/virusinfo/articles/calgary.html.

Cited By

View all
  • (2016)Teaching malware analysis: The design philosophy of a model curriculum2016 4th International Symposium on Digital Forensic and Security (ISDFS)10.1109/ISDFS.2016.7473529(119-125)Online publication date: Apr-2016
  • (2012)Using ISO 27001 in teaching information securityIECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society10.1109/IECON.2012.6389395(3149-3153)Online publication date: Oct-2012
  • (2009)Design and Delivery of Undergraduate IT Security Management CourseProceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance10.1007/978-3-642-02617-1_41(402-411)Online publication date: 18-Jun-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 38, Issue 2
June 2006
199 pages
ISSN:0097-8418
DOI:10.1145/1138403
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2006
Published in SIGCSE Volume 38, Issue 2

Check for updates

Author Tags

  1. information assurance
  2. intrusion detection
  3. malware
  4. teaching information security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Teaching malware analysis: The design philosophy of a model curriculum2016 4th International Symposium on Digital Forensic and Security (ISDFS)10.1109/ISDFS.2016.7473529(119-125)Online publication date: Apr-2016
  • (2012)Using ISO 27001 in teaching information securityIECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society10.1109/IECON.2012.6389395(3149-3153)Online publication date: Oct-2012
  • (2009)Design and Delivery of Undergraduate IT Security Management CourseProceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance10.1007/978-3-642-02617-1_41(402-411)Online publication date: 18-Jun-2009
  • (2008)Taming the diversity of information assurance & securityJournal of Computing Sciences in Colleges10.5555/1352079.135211023:4(173-179)Online publication date: 1-Apr-2008
  • (2008)Defense against the dark artsACM SIGCSE Bulletin10.1145/1352322.135224540:1(315-319)Online publication date: 12-Mar-2008
  • (2008)Defense against the dark artsProceedings of the 39th SIGCSE technical symposium on Computer science education10.1145/1352135.1352245(315-319)Online publication date: 12-Mar-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media