skip to main content
research-article

Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course

Published: 01 September 2013 Publication History

Abstract

Cyber-security is an area in which much curriculum development is taking place; it is important that such efforts be evaluated and shared. We describe three laboratories developed at the United States Naval Academy (USNA) for use in its fundamentals of cyber-security course. All three labs are conducted in a sandboxed virtual environment. Detailed instructor notes, student instructions, worksheets, grading guidance and supporting course software were developed for these labs. In this paper we share our experiences with these labs, assessment and evaluation material, and lessons learned so that others might benefit from our work.

References

[1]
Anon, "Information Assurance Internship," http://iainternship.com/images/IA_internships_flyer_2013_v2.pdf, 2013. Accessed 2013 July 5.
[2]
Brown, W. C. et al. "Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Class's Curriculum at the United States Naval Academy." ASEE Computers in Education Journal, 3, 3 (2012): 63--80.
[3]
Department of Computer Science, University of Maryland. "CMSC 498L/ENEE 459L, Cybersecurity Lab," http://www.cs.umd.edu/class/fall2012/cmsc498L/, 2012. Accessed 2013 July 5.
[4]
Jabbour, K. and Older, S. "A Learning Community for Developing Cyber-Security Leaders. The Advanced Course in Engineering on Cyber Security," http://www.cis.syr.edu/~sueo/papers/ace-wecs.pdf, 2010. Accessed 2013 July 5.
[5]
Obama, B. "Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure." http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf, May 2009. Accessed 2013 July 5.
[6]
Office of the Dean, United States Military Academy, West Point, New York, "Academic Program: Curriculum and Course Descriptions." http://www.usma.edu/curriculum/RedBook/AY13_RedBook.pdf Accessed 2013 July 5.
[7]
Personal communication from Col. David Gibson, the Department Head for Computer Science at USAFA, to Raymond Greenlaw.
[8]
Rome Catholic School, Diocese of Syracuse, "Cyber Security K--12 Curriculum." http://www.romecatholic.org/elementary/cyber-security-k-12-curriculum, 2010. Accessed 2013 July 5.
[9]
School of Computing, Department of Information Technology, University of South Alabama. "ITE 476 -- Network Management Security." http://www.southalabama.edu/bulletin/courite.htm Accessed 2013 July 5.
[10]
USNA, "Introduction to Cyber Security Technical Foundations", faculty notes. http://www.usna.edu/cs/si110/ Accessed 2013 July 5.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Inroads
ACM Inroads  Volume 4, Issue 3
September 2013
75 pages
ISSN:2153-2184
EISSN:2153-2192
DOI:10.1145/2505990
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2013
Published in INROADS Volume 4, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Naval Academy
  2. cyber-security education
  3. cyberspace policy review
  4. hands-on laboratory exercises
  5. information assurance
  6. network attack
  7. network defense
  8. network reconnaissance

Qualifiers

  • Research-article
  • Popular
  • Un-reviewed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)6
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber AttacksComputer Security – ESORICS 202210.1007/978-3-031-17143-7_26(535-553)Online publication date: 26-Sep-2022
  • (2021)Reconnaissance Attacks: A First Step to Hack IoT Devices and Cyber CrimeComputational Intelligence in Pattern Recognition10.1007/978-981-16-2543-5_16(183-194)Online publication date: 5-Sep-2021
  • (2017)PLAYGROUND: preparing students for the cyber battlegroundComputer Science Education10.1080/08993408.2016.127152626:4(255-276)Online publication date: 11-Jan-2017
  • (2015)Student-centered learning in cybersecurity in summer semesterProceedings of the 2015 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2015.7344154(1-4)Online publication date: 21-Oct-2015

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media