skip to main content
10.1145/2512276.2512290acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Training cyber-defense and securing information assets using student blue teams

Published: 02 October 2013 Publication History

Abstract

In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident response and system hardening. Finally, we discuss the benefits to students taking part in these activities, as well as their contributions to improving an organizations security posture.

References

[1]
Conklin, A. 2006. Cyber defense competitions and information security education: An active learning solution for a capstone course. System Sciences, 2006. HICSS'06. Proceedings of ...00, C (2006), 1--6.
[2]
Hill, J. M. D., Carver, C. a., Humphries, J. W. and Pooch, U. W. 2001. Using an isolated network laboratory to teach advanced networks and security. ACM SIGCSE Bulletin. 33, 1 (Mar. 2001), 36--40.
[3]
Jr, R. D. 2003. Organization and training of a cyber security team. Systems, Man and .... (2003).
[4]
Kercher, K. and Rowe, D. 2012. Risks, Rewards and Raising Awareness: Training a Cyber Workforce Using Student Red Teams. SIGITE. (2012).
[5]
Rowe, D. 2012. Cyber-Security, IAS and the Cyber Warrior. The Colloquium for Information Systems Security .... (2012).
[6]
Vigna, G. 2003. Teaching Hands-On Network Security: Testbeds and Live Exercises. Journal of Information Warfare. 2, 3 (2003), 8--24.
[7]
Wang, X., Hembroff, G.C., Yedica, R., Ave, N.M. and Bay, G. 2008. Using VMware VCenter Lab Manager in Undergraduate Education for System Administration and Network Security Categories and Subject Descriptors. CISSE (2008), 43--51.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGITE '13: Proceedings of the 14th annual ACM SIGITE conference on Information technology education
October 2013
220 pages
ISBN:9781450322393
DOI:10.1145/2512276
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blue-team
  2. education
  3. forensics
  4. incident response
  5. security
  6. training

Qualifiers

  • Research-article

Conference

SIGITE/RIIT'13
Sponsor:
SIGITE/RIIT'13: SIGITE/RIIT 2013
October 10 - 12, 2013
Florida, Orlando, USA

Acceptance Rates

SIGITE '13 Paper Acceptance Rate 28 of 70 submissions, 40%;
Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 228
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media