skip to main content
research-article

Visualization Tools for Teaching Computer Security

Published: 01 January 2010 Publication History

Abstract

Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network concepts, the Kerberos authentication architecture, and wireless network attacks. These tools are implemented using Macromedia Flash MX Professional Edition. The animations can run from a Web page as Flash Applets or as standalone applications. These visualization tools are intended to be used in undergraduate level computer network and security courses. They can be used as classroom instructor demos, student exercises, or Web-based student learning resources. These tools have been used in various computer network and information security courses at North Carolina A&T State University, and have received positive feedback from the students.

References

[1]
Bhagyavati et al. 2005. Teaching hands-on computer and information systems security despite limited resources. In Proceedings of the 36th SIGCSE Technical Symposium (SIGCSE’05), 325--326.
[2]
Bishop, D. 2003. Introduction to Cryptography with Java Applets. Jones and Bartlett Publishers, Boston.
[3]
Comer, E. 2004. Computer Networks and Internets 4th Ed. Pearson Prentice Hall.
[4]
Bryant, W. 1988. Designing an authentication system: A dialogue in four scenes. http://web.mit.edu/kerberos/www/dialogue.html.
[5]
Cone B. D. et al. 2007. A video game for cyber security training and awareness. Comput. Secur. 26, 63--72.
[6]
Crandall J. R. et al. 2002. Driving home the buffer overflow problem: A training module for programmers and managers. In Proceedings of the National Colloquium for Information Systems Security Education (NCISSE’02).
[7]
Deutsche Bank AG. CrypTool. 2009. http://www.cryptool.org.
[8]
Elmqvist, N. 2004. ProtoViz: A simple security protocol visualization report. http://www.cs.chalmers.se/~elm/courses/security/report.pdf.
[9]
Frincke, D. and Bishop, M. 2004. Joining the security education community. IEEE Security Privacy 2, 5, 61--63.
[10]
Fung et al. 2008. Raising information security awareness in digital ecosystem with games -- A pilot study in Thailand. In Proceedings of the 2nd IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST’08). 375--379.
[11]
Gerhart S. et al. 2005. Increasing security in aviation-oriented computing education: A modular approach. http://nsfsecurity.pr.erau.edu/.
[12]
GVU. 2002. Algorithm animation. http://www.cc.gatech.edu/gvu/softviz/algoanim/.
[13]
Greitzer F. L. et al. 2007. Cognitive science implications for enhancing training effectiveness in a serious gaming context. J. Educ. Res. Comput. 7, 3.
[14]
Grissom S. et al. 2003. Algorithm visualization in CS education: Comparing levels of student engagement. In Proceedings of the ACM Symposium on Software Visualization (SV’03). 87--93.
[15]
Holliday, M. A. 2003. Animation of computer networking concepts. J. Educ. Res. Comput. 3, 2.
[16]
Holliday, M. A. and Johnson, M. 2004. A Web-based introduction to computer networks for non-majors. The protocol stack. http://cs.wcu.edu/~holliday/cware/Stack/indexStack.html.
[17]
Irvine, C. E. and Thompson, M. F. 2005. CyberCIEGE: Gaming for information assurance. IEEE Security Privacy 3, 3, 61--64.
[18]
LeBlanc, C. and Stiller, E. 2004. Teaching computer security at a small college. In Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’04). 407--411.
[19]
Mullins P. et al. 2002. Panel on integrating security concepts into existing computer courses. In Proceedings of the 33th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’02).
[20]
Naps T. L. et al. 2003a. Exploring the role of visualization and engagement in computer science education. SIGCSE Bull. 35, 2, 131--152.
[21]
Naps T. L. et al. 2003b. Evaluating the educational impact of visualization. In Proceedings of the 8th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE’03).
[22]
Null, L. and Rao, K. 2005. CAMERA: Introducing memory concepts via visualization. In Proceedings of the 36th SIGCSE Technical Symposium (SIGCSE’05). 96--100.
[23]
Schweitzer, D. and Baird, L. 2006. The design and use of interactive visualization applets for teaching ciphers. In Proceedings of the IEEE Workshop on Information Assurance (WIA’06). 69--75.
[24]
Schweitzer, D., Baird, L., Collins, M., Brown, W., and Sherman, M. 2006. GRASP: A visualization tool for teaching security protocols. In Proceedings of the 10th Colloquium for Information Systems Security Education (CISSE’06), 75--81.
[25]
Stallings, W. 2003. Cryptography and Network Security. Prentice Hall, Upper Saddle River, NJ.
[26]
Steiner, J. G., Neuman, C., and Schiller, J. I. 1988. Kerberos: An authentication service for open network systems. In Proceedings of the Winter USENIX Conference (USENIX’88). 191--202.
[27]
Whitman, M. E. and Mattord, H. J. 2009. Principles of Information Security 3rd Ed. Course Technology.
[28]
Yuan, X., Vega, P., Xu, J., Yu, H., and Li, Y. 2007a. Using packet sniffer simulator in the class: Experience and evaluation. In Proceedings of the 45th ACM Southeast Conference (ACMSE’07).
[29]
Yuan, X., Qadah, Y., Xu, J., Yu, H., Archer, R., and Chu, B. 2007b. An animated learning tool for Kerberos authentication architecture. J. Comput. Sci. Coll. 22, 6.
[30]
Yuan, X., Archer, R. L., Xu, J., and Yu, H. 2008. A visualization tool for wireless network attacks. In Proceedings of the 6th International Conference on Education and Information Systems, Technologies and Applications (EISTA’08).

Cited By

View all
  • (2024)Advanced Network and System Security TeachingElectronics10.3390/electronics1401000314:1(3)Online publication date: 24-Dec-2024
  • (2023)Design & Development of Virtual Reality Empowered Cyber-Security Training Testbed for IoT Systems2023 3rd Intelligent Cybersecurity Conference (ICSC)10.1109/ICSC60084.2023.10349976(86-94)Online publication date: 23-Oct-2023
  • (2021)Conceptual Model of Visual Analytics for Hands-on Cybersecurity TrainingIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2020.297733627:8(3425-3437)Online publication date: 1-Aug-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Computing Education
ACM Transactions on Computing Education  Volume 9, Issue 4
January 2010
79 pages
EISSN:1946-6226
DOI:10.1145/1656255
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2010
Accepted: 01 July 2009
Revised: 01 May 2009
Received: 01 August 2008
Published in TOCE Volume 9, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Computer security
  2. Kerberos authentication architecture
  3. packet sniffer
  4. visualization and animation
  5. wireless network attacks

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Advanced Network and System Security TeachingElectronics10.3390/electronics1401000314:1(3)Online publication date: 24-Dec-2024
  • (2023)Design & Development of Virtual Reality Empowered Cyber-Security Training Testbed for IoT Systems2023 3rd Intelligent Cybersecurity Conference (ICSC)10.1109/ICSC60084.2023.10349976(86-94)Online publication date: 23-Oct-2023
  • (2021)Conceptual Model of Visual Analytics for Hands-on Cybersecurity TrainingIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2020.297733627:8(3425-3437)Online publication date: 1-Aug-2021
  • (2020)Methods in Teaching Computer NetworksACM Transactions on Computing Education10.1145/339496320:3(1-35)Online publication date: 16-Jun-2020
  • (2020)Cyberspace Odyssey: A Competitive Team-Oriented Serious Game in Computer NetworkingIEEE Transactions on Learning Technologies10.1109/TLT.2020.300860713:3(502-515)Online publication date: 1-Jul-2020
  • (2020)Usability Assessment on Symmetric Cryptography Learning Module2020 2nd International Conference on Computer and Information Sciences (ICCIS)10.1109/ICCIS49240.2020.9257644(1-6)Online publication date: 13-Oct-2020
  • (2020)Development of NgeXTEA: a web based learning tool for cryptography algorithmJournal of Physics: Conference Series10.1088/1742-6596/1521/4/0420491521(042049)Online publication date: 23-May-2020
  • (2019)Teaching Integer Security Using Simple VisualizationsProceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education10.1145/3304221.3319760(513-519)Online publication date: 2-Jul-2019
  • (2019)FakesbookProceedings of the 50th ACM Technical Symposium on Computer Science Education10.1145/3287324.3287486(892-898)Online publication date: 22-Feb-2019
  • (2018)Application and Evaluation of Visual CPU Simulator to Support Information Security EducationIEEJ Transactions on Electronics, Information and Systems10.1541/ieejeiss.138.1116138:9(1116-1122)Online publication date: 1-Sep-2018
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media