skip to main content
10.1145/1940941.1940947acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Case studies for teaching physical security and security policy

Published: 01 October 2010 Publication History

Abstract

Teaching with case studies is an important method that engages students in active learning. This paper describes two case studies we developed and our experiences teaching information security with these two case studies. The case studies were used to teach physical security and security policy. Each case study includes the learning objectives, case description and a series of case discussion questions. The case discussion questions were mapped to Bloom's taxonomy and Fink's taxonomy. Our teaching methods and student feedback are described. Our future work will include refining the developed case studies, continuing to evaluate their effectiveness, developing more case studies, and exploring different ways of teaching case studies.

References

[1]
Penn State University Teaching and Learning Technology, Using cases in teaching, available at: http://tlt.its.psu.edu/suggestions/cases/index.html, accessed on June 1, 2010.
[2]
Bloom's Taxonomy, available at: http://www.officeport.com/edu/blooms.htm, accessed on June 1, 2010.
[3]
Fink, L. Dee. What is Significant Learning? available at: www.wcu.edu/WebFiles/PDFs/facultycenter_SignificantLearning.pdf, accessed on June 1, 2010.
[4]
Whitman, M. E. and Mattford, H. J. Principles of Information Security 3rd Edition, Thomson Course Technology, 2009.
[5]
SANS Infosec Reading Room -- Physical Security, available at: http://www.sans.org/reading_room/whitepapers/physcial/, accessed on June 1, 2010.
[6]
How Cisco IT controls building security over the enterprise WAN, Cisco IT case study: Enterprise network building security, available at: www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/Cisco_IT_Case_Study_Enterprise_Access_Control.pdf, accessed on June 1, 2010.
[7]
Scarfone, K. and Hoffman, P. Guidelines on firewalls and firewall policies, National Institute of Standards and Technology Special Publication 800--41, available at: http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdf, accessed on June 1, 2010.
[8]
Security Policy: North Carolina Agricultural and Technical State University Information Security Plan, available at: www.ncat.edu/~cit/policies/information_security_plan.pdf, accessed on June 1, 2010.
[9]
Security Policy: Griffith University security policy. November2002, available at: www.griffith.edu.au/ins/org/policies/content01.html, accessed on February, 10, 2010.
[10]
Security Policy: Sample Backup policy, available at: http://www.comptechdoc.org/independent/security/policies/backup-policy.html, accessed on June 1, 2010.
[11]
SANS Reading room. Sample Communication Policy, available at: www.sans.org/resources/policies/Communications_Equipment2.pdf, accessed on June 1, 2010.
[12]
SANS Infosec Reading Room Sample Issue specific policies, available at: http://www.sans.org/resources/policies/, accessed on June 1, 2010.

Cited By

View all
  • (2024)Case-based learning for cybersecurity leadersInformation and Management10.1016/j.im.2024.10401561:7Online publication date: 1-Nov-2024
  • (2019)On the Learning Activities and Outcomes of an Information Security CourseProceedings of the 19th Koli Calling International Conference on Computing Education Research10.1145/3364510.3366158(1-2)Online publication date: 21-Nov-2019
  • (2015)Using a case study to teach students about finding and fixing logic flaws in softwareProceedings of the 2015 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2015.7344155(1-7)Online publication date: 21-Oct-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
InfoSecCD '10: 2010 Information Security Curriculum Development Conference
October 2010
187 pages
ISBN:9781450302029
DOI:10.1145/1940941
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • KSU - CISE: KSU Center for InfoSec Education
  • ISSA: The Metro Atlanta Information Systems Security Association

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. case study
  2. information security education
  3. physical security
  4. security policy

Qualifiers

  • Research-article

Funding Sources

Conference

InfoSecCD '10
Sponsor:
  • KSU - CISE
  • ISSA

Acceptance Rates

Overall Acceptance Rate 18 of 23 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Case-based learning for cybersecurity leadersInformation and Management10.1016/j.im.2024.10401561:7Online publication date: 1-Nov-2024
  • (2019)On the Learning Activities and Outcomes of an Information Security CourseProceedings of the 19th Koli Calling International Conference on Computing Education Research10.1145/3364510.3366158(1-2)Online publication date: 21-Nov-2019
  • (2015)Using a case study to teach students about finding and fixing logic flaws in softwareProceedings of the 2015 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2015.7344155(1-7)Online publication date: 21-Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media