Abstract
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network concepts, the Kerberos authentication architecture, and wireless network attacks. These tools are implemented using Macromedia Flash MX Professional Edition. The animations can run from a Web page as Flash Applets or as standalone applications. These visualization tools are intended to be used in undergraduate level computer network and security courses. They can be used as classroom instructor demos, student exercises, or Web-based student learning resources. These tools have been used in various computer network and information security courses at North Carolina A&T State University, and have received positive feedback from the students.
- Bhagyavati et al. 2005. Teaching hands-on computer and information systems security despite limited resources. In Proceedings of the 36th SIGCSE Technical Symposium (SIGCSE’05), 325--326. Google ScholarDigital Library
- Bishop, D. 2003. Introduction to Cryptography with Java Applets. Jones and Bartlett Publishers, Boston. Google ScholarDigital Library
- Comer, E. 2004. Computer Networks and Internets 4th Ed. Pearson Prentice Hall.Google Scholar
- Bryant, W. 1988. Designing an authentication system: A dialogue in four scenes. http://web.mit.edu/kerberos/www/dialogue.html.Google Scholar
- Cone B. D. et al. 2007. A video game for cyber security training and awareness. Comput. Secur. 26, 63--72.Google ScholarDigital Library
- Crandall J. R. et al. 2002. Driving home the buffer overflow problem: A training module for programmers and managers. In Proceedings of the National Colloquium for Information Systems Security Education (NCISSE’02).Google Scholar
- Deutsche Bank AG. CrypTool. 2009. http://www.cryptool.org.Google Scholar
- Elmqvist, N. 2004. ProtoViz: A simple security protocol visualization report. http://www.cs.chalmers.se/~elm/courses/security/report.pdf.Google Scholar
- Frincke, D. and Bishop, M. 2004. Joining the security education community. IEEE Security Privacy 2, 5, 61--63. Google ScholarDigital Library
- Fung et al. 2008. Raising information security awareness in digital ecosystem with games -- A pilot study in Thailand. In Proceedings of the 2nd IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST’08). 375--379.Google ScholarCross Ref
- Gerhart S. et al. 2005. Increasing security in aviation-oriented computing education: A modular approach. http://nsfsecurity.pr.erau.edu/.Google Scholar
- GVU. 2002. Algorithm animation. http://www.cc.gatech.edu/gvu/softviz/algoanim/.Google Scholar
- Greitzer F. L. et al. 2007. Cognitive science implications for enhancing training effectiveness in a serious gaming context. J. Educ. Res. Comput. 7, 3. Google ScholarDigital Library
- Grissom S. et al. 2003. Algorithm visualization in CS education: Comparing levels of student engagement. In Proceedings of the ACM Symposium on Software Visualization (SV’03). 87--93. Google ScholarDigital Library
- Holliday, M. A. 2003. Animation of computer networking concepts. J. Educ. Res. Comput. 3, 2. Google ScholarDigital Library
- Holliday, M. A. and Johnson, M. 2004. A Web-based introduction to computer networks for non-majors. The protocol stack. http://cs.wcu.edu/~holliday/cware/Stack/indexStack.html.Google Scholar
- Irvine, C. E. and Thompson, M. F. 2005. CyberCIEGE: Gaming for information assurance. IEEE Security Privacy 3, 3, 61--64. Google ScholarDigital Library
- LeBlanc, C. and Stiller, E. 2004. Teaching computer security at a small college. In Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’04). 407--411. Google ScholarDigital Library
- Mullins P. et al. 2002. Panel on integrating security concepts into existing computer courses. In Proceedings of the 33th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’02). Google ScholarDigital Library
- Naps T. L. et al. 2003a. Exploring the role of visualization and engagement in computer science education. SIGCSE Bull. 35, 2, 131--152. Google ScholarDigital Library
- Naps T. L. et al. 2003b. Evaluating the educational impact of visualization. In Proceedings of the 8th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE’03). Google ScholarDigital Library
- Null, L. and Rao, K. 2005. CAMERA: Introducing memory concepts via visualization. In Proceedings of the 36th SIGCSE Technical Symposium (SIGCSE’05). 96--100. Google ScholarDigital Library
- Schweitzer, D. and Baird, L. 2006. The design and use of interactive visualization applets for teaching ciphers. In Proceedings of the IEEE Workshop on Information Assurance (WIA’06). 69--75.Google Scholar
- Schweitzer, D., Baird, L., Collins, M., Brown, W., and Sherman, M. 2006. GRASP: A visualization tool for teaching security protocols. In Proceedings of the 10th Colloquium for Information Systems Security Education (CISSE’06), 75--81.Google Scholar
- Stallings, W. 2003. Cryptography and Network Security. Prentice Hall, Upper Saddle River, NJ.Google Scholar
- Steiner, J. G., Neuman, C., and Schiller, J. I. 1988. Kerberos: An authentication service for open network systems. In Proceedings of the Winter USENIX Conference (USENIX’88). 191--202.Google Scholar
- Whitman, M. E. and Mattord, H. J. 2009. Principles of Information Security 3rd Ed. Course Technology.Google Scholar
- Yuan, X., Vega, P., Xu, J., Yu, H., and Li, Y. 2007a. Using packet sniffer simulator in the class: Experience and evaluation. In Proceedings of the 45th ACM Southeast Conference (ACMSE’07). Google ScholarDigital Library
- Yuan, X., Qadah, Y., Xu, J., Yu, H., Archer, R., and Chu, B. 2007b. An animated learning tool for Kerberos authentication architecture. J. Comput. Sci. Coll. 22, 6. Google ScholarDigital Library
- Yuan, X., Archer, R. L., Xu, J., and Yu, H. 2008. A visualization tool for wireless network attacks. In Proceedings of the 6th International Conference on Education and Information Systems, Technologies and Applications (EISTA’08).Google Scholar
Index Terms
- Visualization Tools for Teaching Computer Security
Recommendations
Two models of a cryptography and computer security class in a liberal arts context
SIGCSE '13: Proceeding of the 44th ACM technical symposium on Computer science educationThe critical need for computer security concepts to be taught in the undergraduate computer science curriculum is evident from current news stories, curricular guidelines, and government initiatives. Beginning to teach a standalone computer security ...
Design of a computer security teaching and research laboratory (abstract only)
SIGCSE '12: Proceedings of the 43rd ACM technical symposium on Computer Science EducationTo enhance the learning process a certain amount of hands-on experience is desirable to supplement the theory portion of computer security-related courses. This includes courses in information assurance, database security, computer security and computer ...
Teaching information systems security courses: A hands-on approach
It has become imperative for companies, governments, and organizations to understand how to guard against hackers, outsiders, and even disgruntled employees who threaten their information security, integrity and daily business operations. To address ...
Comments