skip to main content
research-article

Visualization Tools for Teaching Computer Security

Published:01 January 2010Publication History
Skip Abstract Section

Abstract

Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network concepts, the Kerberos authentication architecture, and wireless network attacks. These tools are implemented using Macromedia Flash MX Professional Edition. The animations can run from a Web page as Flash Applets or as standalone applications. These visualization tools are intended to be used in undergraduate level computer network and security courses. They can be used as classroom instructor demos, student exercises, or Web-based student learning resources. These tools have been used in various computer network and information security courses at North Carolina A&T State University, and have received positive feedback from the students.

References

  1. Bhagyavati et al. 2005. Teaching hands-on computer and information systems security despite limited resources. In Proceedings of the 36th SIGCSE Technical Symposium (SIGCSE’05), 325--326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bishop, D. 2003. Introduction to Cryptography with Java Applets. Jones and Bartlett Publishers, Boston. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Comer, E. 2004. Computer Networks and Internets 4th Ed. Pearson Prentice Hall.Google ScholarGoogle Scholar
  4. Bryant, W. 1988. Designing an authentication system: A dialogue in four scenes. http://web.mit.edu/kerberos/www/dialogue.html.Google ScholarGoogle Scholar
  5. Cone B. D. et al. 2007. A video game for cyber security training and awareness. Comput. Secur. 26, 63--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Crandall J. R. et al. 2002. Driving home the buffer overflow problem: A training module for programmers and managers. In Proceedings of the National Colloquium for Information Systems Security Education (NCISSE’02).Google ScholarGoogle Scholar
  7. Deutsche Bank AG. CrypTool. 2009. http://www.cryptool.org.Google ScholarGoogle Scholar
  8. Elmqvist, N. 2004. ProtoViz: A simple security protocol visualization report. http://www.cs.chalmers.se/~elm/courses/security/report.pdf.Google ScholarGoogle Scholar
  9. Frincke, D. and Bishop, M. 2004. Joining the security education community. IEEE Security Privacy 2, 5, 61--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Fung et al. 2008. Raising information security awareness in digital ecosystem with games -- A pilot study in Thailand. In Proceedings of the 2nd IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST’08). 375--379.Google ScholarGoogle ScholarCross RefCross Ref
  11. Gerhart S. et al. 2005. Increasing security in aviation-oriented computing education: A modular approach. http://nsfsecurity.pr.erau.edu/.Google ScholarGoogle Scholar
  12. GVU. 2002. Algorithm animation. http://www.cc.gatech.edu/gvu/softviz/algoanim/.Google ScholarGoogle Scholar
  13. Greitzer F. L. et al. 2007. Cognitive science implications for enhancing training effectiveness in a serious gaming context. J. Educ. Res. Comput. 7, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Grissom S. et al. 2003. Algorithm visualization in CS education: Comparing levels of student engagement. In Proceedings of the ACM Symposium on Software Visualization (SV’03). 87--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Holliday, M. A. 2003. Animation of computer networking concepts. J. Educ. Res. Comput. 3, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Holliday, M. A. and Johnson, M. 2004. A Web-based introduction to computer networks for non-majors. The protocol stack. http://cs.wcu.edu/~holliday/cware/Stack/indexStack.html.Google ScholarGoogle Scholar
  17. Irvine, C. E. and Thompson, M. F. 2005. CyberCIEGE: Gaming for information assurance. IEEE Security Privacy 3, 3, 61--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. LeBlanc, C. and Stiller, E. 2004. Teaching computer security at a small college. In Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’04). 407--411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Mullins P. et al. 2002. Panel on integrating security concepts into existing computer courses. In Proceedings of the 33th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’02). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Naps T. L. et al. 2003a. Exploring the role of visualization and engagement in computer science education. SIGCSE Bull. 35, 2, 131--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Naps T. L. et al. 2003b. Evaluating the educational impact of visualization. In Proceedings of the 8th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE’03). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Null, L. and Rao, K. 2005. CAMERA: Introducing memory concepts via visualization. In Proceedings of the 36th SIGCSE Technical Symposium (SIGCSE’05). 96--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Schweitzer, D. and Baird, L. 2006. The design and use of interactive visualization applets for teaching ciphers. In Proceedings of the IEEE Workshop on Information Assurance (WIA’06). 69--75.Google ScholarGoogle Scholar
  24. Schweitzer, D., Baird, L., Collins, M., Brown, W., and Sherman, M. 2006. GRASP: A visualization tool for teaching security protocols. In Proceedings of the 10th Colloquium for Information Systems Security Education (CISSE’06), 75--81.Google ScholarGoogle Scholar
  25. Stallings, W. 2003. Cryptography and Network Security. Prentice Hall, Upper Saddle River, NJ.Google ScholarGoogle Scholar
  26. Steiner, J. G., Neuman, C., and Schiller, J. I. 1988. Kerberos: An authentication service for open network systems. In Proceedings of the Winter USENIX Conference (USENIX’88). 191--202.Google ScholarGoogle Scholar
  27. Whitman, M. E. and Mattord, H. J. 2009. Principles of Information Security 3rd Ed. Course Technology.Google ScholarGoogle Scholar
  28. Yuan, X., Vega, P., Xu, J., Yu, H., and Li, Y. 2007a. Using packet sniffer simulator in the class: Experience and evaluation. In Proceedings of the 45th ACM Southeast Conference (ACMSE’07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Yuan, X., Qadah, Y., Xu, J., Yu, H., Archer, R., and Chu, B. 2007b. An animated learning tool for Kerberos authentication architecture. J. Comput. Sci. Coll. 22, 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Yuan, X., Archer, R. L., Xu, J., and Yu, H. 2008. A visualization tool for wireless network attacks. In Proceedings of the 6th International Conference on Education and Information Systems, Technologies and Applications (EISTA’08).Google ScholarGoogle Scholar

Index Terms

  1. Visualization Tools for Teaching Computer Security

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Computing Education
              ACM Transactions on Computing Education  Volume 9, Issue 4
              January 2010
              79 pages
              EISSN:1946-6226
              DOI:10.1145/1656255
              Issue’s Table of Contents

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 January 2010
              • Accepted: 1 July 2009
              • Revised: 1 May 2009
              • Received: 1 August 2008
              Published in toce Volume 9, Issue 4

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader