skip to main content
10.1145/1867651.1867666acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Feasibility of virtual security laboratory for three-tiered distance education

Published: 07 October 2010 Publication History

Abstract

Today, a number of universities and colleges offering security education has been growing rapidly for last couple of years. Most universities have adequate facilities and labs to provide hand-on experience in security courses, but some universities and colleges that initiated security courses do not have equipments and space to offer hand-on experience for the students. This is challenge for distance learning students, who reside long distance from the universities, since they are not able to receive adequate hand-on training and this may cause limited job opportunities after their graduation. Even if universities provide students with distance education those who reside long distance from the universities, students will face difficulties in job opportunities after their graduation. In this paper, we introduce our feasibility study on three-tier web portal system for distance education focusing on cyber security laboratory for students, schools, and industry. Industry as prospective employers will be one of users of the three-tier web portal system. Universities will be interacting with industry and students in delivering hands-on experience and state-of-the-art knowledge of security that will be one of strong points in education service delivery to improve students' job opportunities and efficient method of recruiting and hiring high quality workforce.

References

[1]
}}Choi, Y., 2010, Ethereal Lab. Regent University.
[2]
}}Choi, Y., 2010, Fingerprint Reader Lab. Regent University.
[3]
}}Choi, Y., Reif H. and Clarke K., 2007, Moving Beyond Integrating Ubiquitous Undergraduate Research Skills in Undergraduate Information Systems Degree Programs. Thirty-Seventh Annual Meeting of the Southeast Decision Sciences Institute (SEDSI 2007), Savannah, Georgia, USA.
[4]
}}Choi, Y., Choi, Y. S., and Reif, H., 2007, Global Telecommunications Education Trends: ITU-T, TeleManagement Forum, and ITERA, The 2007 US-Korea Conference on Science, Technology, and Entrepreneurship (UKC-2007), Communication and Networking Technology Symposium.
[5]
}}Choi, Y., Ryoo, J., Reif, H., and Lim, H., 2008, Meeting Growing Demands of Standardization Education in Information and Communications Technology Industry, Thirty-Eighth Annual Meeting of the Southeast Decision Sciences Institute (SEDSI 2008).
[6]
}}Choi, Y., Diana, M., and Johnson, A., 2009 Network Security for Cyber War. Thirty-Ninth Annual Meeting of the Southeast Decision Sciences Institute (SEDSI 2009).
[7]
}}Second Life (web site), www.secondlife.com.
[8]
}}Afsarmanesh, H., Benabdelkader, A., Kaletas, E., Garita, C., Hertzberger, L., Towards a Multi-layer Architecture for Scientific Virtual Laboratories, Lecture Notes in Computer Science, Volume 1823/2010, 2010.
[9]
}}Sharma, S. and Sefchek, J, Teaching information systems security courses: A hands-on approach, Computers & Security, Volume 26, Issue 4, June 2007, pp. 290--299.
[10]
}}Bullers, W., Burd, S., and Seazzu., A., Virtual Machines - An Idea Whose Time Has Returned: Application to Network, Security, and Database Courses, SIGCSE'06, March 1--5, 2006, Houston, Texas, USA.
[11]
}}Rigby, S. and Dark, M., Designing a Flexible, Multipurpose Remote Lab for IT Curriculum, Conference On Information Technology Education (formerly CITC) Proceedings of the 7th conference on Information technology education, Minneapolis, Minnesota, USA., pp. 161--164, 2006.
[12]
}}Hu, J., Cordel, D., and Meinel, C., A Virtual Laboratory for IT Security Education, The Conference on Information Systems in E-Business and E-Government (EMISA), Luxembourg, 6--8 Oct 2004, pp. 60--71.
[13]
}}Hu, J. and Meinel, Tele-Lab IT Security: A Means to Build Security Laboratories on the Web, Advanced Information Networking and Applications, International Conference on, vol. 2, pp. 285, 18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 2, Fukuoka, Japan, March 29--31, 2004.
[14]
}}Padman, V. and Memon, N., Design of A Virtual Laboratory for Information Assurance Education and Research, The 2002 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 17--19 June 2002.
[15]
}}Mead, N. and McGraw, G., A Portal for Software Security, IEEE Security & Privacy, 2005.
[16]
}}Security Management Portal, URL= http://www.checkpoint.com/products/smp/index.html.
[17]
}}List of Free and Open Source Software Packages (Security Area), URL= http://en.wikipedia.org/wiki/List_of_free_and_open_source_software_packages#Security.
[18]
}}TM Forum University Liaison Program (ULP), URL= http://www.tmforum.org/ParticipatingUniversities/33369/article.html?linkid=33369.
[19]
}}ITERA, URL= http://www.itera.org/index.php.
[20]
}}Security in Telecommunications and Information Technology -- Overview the issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, 2003, URL= http://www.itu.int/itudoc/itu-t/85097.pdf.

Cited By

View all
  • (2023)Analysis for Information Security in Virtual Environments for a Higher Education Institution2023 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI62032.2023.00286(1739-1745)Online publication date: 13-Dec-2023
  • (2021)SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security LaboratoriesProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470034(1-11)Online publication date: 17-Aug-2021
  • (2020)Developing an Undergraduate Course Curriculum for Ethical HackingProceedings of the 21st Annual Conference on Information Technology Education10.1145/3368308.3415366(330-335)Online publication date: 7-Oct-2020
  • Show More Cited By

Index Terms

  1. Feasibility of virtual security laboratory for three-tiered distance education

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGITE '10: Proceedings of the 2010 ACM conference on Information technology education
      October 2010
      180 pages
      ISBN:9781450303439
      DOI:10.1145/1867651
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 October 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. exercises
      2. labs
      3. security
      4. security education
      5. virtual lab

      Qualifiers

      • Research-article

      Conference

      SIGITE '10
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 176 of 429 submissions, 41%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 15 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Analysis for Information Security in Virtual Environments for a Higher Education Institution2023 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI62032.2023.00286(1739-1745)Online publication date: 13-Dec-2023
      • (2021)SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security LaboratoriesProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470034(1-11)Online publication date: 17-Aug-2021
      • (2020)Developing an Undergraduate Course Curriculum for Ethical HackingProceedings of the 21st Annual Conference on Information Technology Education10.1145/3368308.3415366(330-335)Online publication date: 7-Oct-2020
      • (2018)Using Kali Linux Security Tools to Create Laboratory Projects for Cybersecurity EducationProceedings of the Future Technologies Conference (FTC) 201810.1007/978-3-030-02683-7_25(358-367)Online publication date: 20-Oct-2018
      • (2015)Conceptual Model of Online Pedagogical Information Security LaboratoryProceedings of the 2015 48th Hawaii International Conference on System Sciences10.1109/HICSS.2015.16(43-52)Online publication date: 5-Jan-2015
      • (2013)Initial Design Principles for an Educational, On-line Information Security LaboratoryProceedings of the 12th International Conference on Advances in Web-Based Learning --- ICWL 2013 - Volume 816710.1007/978-3-642-41175-5_10(89-100)Online publication date: 6-Oct-2013
      • (2012)Towards a Design Theory for Educational On-line Information Security LaboratoriesAdvances in Web-Based Learning - ICWL 201210.1007/978-3-642-33642-3_32(295-306)Online publication date: 2012

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media