skip to main content
10.1145/3241815.3241855acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Developing and Evaluating an Experimental Learning Environment for Cyber Security Education

Published:14 September 2018Publication History

ABSTRACT

This paper discussed a virtual network implemented in an intrusion detection and incidence response graduate course at East Carolina University. By using virtualization technology, the virtual network provided students with an experimental learning environment that simulates real world cybersecurity activities. The network included multiple virtual machines (VMs) and they were built inside of Graphical Network Simulator (GNS3) located in a Windows 10 Operating System (OS). Multiple OSs were configured on VMware's vCloud Director (VCD) and each student had his/her own OS after logging in to VCD. Since VCD is accessible via the Internet, students were able to access their learning environments anytime and anywhere in the world. In addition, a survey regarding the learning environment was conducted at the end of the Fall semester in 2017.

References

  1. Drolet, M. 2018. What does stolen data cost per second. Retrieved from https://www.csoonline.com/article/3251606/data-breach/what-does-stolen-data-cost-per-second.htmlGoogle ScholarGoogle Scholar
  2. Armerding, T. 2018. The 17 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.htmlGoogle ScholarGoogle Scholar
  3. IC3: total damage caused by reported cyber crime 2001--2016. (n.d.). Retrieved from https://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/Google ScholarGoogle Scholar
  4. National Centers of Academic Excellence in Cyber Defense. (n.d.). Retrieved from https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/Google ScholarGoogle Scholar
  5. Abler, R.T, Contis, D., Grizzard, J.B. and Owen, H.L. 2006. Georgia Tech Information Security Center Hands-on Network Security Laboratory. IEEE Transactions on Education, 49(1), 82--87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Nance, K.L and Hay, B. 2006. Evolution of the ASSERT Computer Security Lab. Proceedings of the 9th ACM SIGITE Colloquium for Information Systems Security Education.Google ScholarGoogle Scholar
  7. Ho, J. W., Mallesh, N., and Wright M. 2009. The Design and Lessons of the ASCENT Security Teaching Lab. Proceedings of the 13th Colloquium for Information Systems Security Education, Seattle, WA, 124--132.Google ScholarGoogle Scholar
  8. Caliskan, E., Tatar, U., Bahsi, H., Ottis, R., and Vaarandi, R. 2017. Capability Detection and Evaluation Metrics for Cyber Security lab Exercises. Proceedings of the International Conference on Cyber Warfare and Security, 407--414.Google ScholarGoogle Scholar
  9. Vykopal, J., Vizvary, M., Oslejsek, R, Celeda, P., and Tovarnak, D. 2017. Lessons learned from complex hands-on defence exercises in a cyber range. Proceedings of the IEEE Frontiers in Education Conference (FIE), Indianapolis, IN.Google ScholarGoogle Scholar
  10. Yuan, X., Williams, K., Yu, H., Rorrer, A., and Chu, B.T. 2017. Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies. Journal of Information Systems Education, 28(1), 11--19.Google ScholarGoogle Scholar
  11. Behar-Horenstein, L. S. and Niu, L. 2011. Teaching critical thinking skills in higher education: A review of the literature. Journal of College Teaching & Learning, 8(2).Google ScholarGoogle ScholarCross RefCross Ref
  12. Kalelioğlu, F. and Gülbahar, Y. 2014. The effect of instructional techniques on critical thinking and critical thinking dispositions in online discussion. Journal of Educational Technology & Society, 17(1).Google ScholarGoogle Scholar
  13. Chou, T.S. and Mohammed, T. 2014. Learning Computer Systems' Vulnerabilities Exploitation Through Penetration Test Experiments. Proceedings of the American Society for Engineering Education (ASEE) Gulf-Southwest Conference, New Orleans, Louisiana, 1--6.Google ScholarGoogle Scholar

Index Terms

  1. Developing and Evaluating an Experimental Learning Environment for Cyber Security Education

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SIGITE '18: Proceedings of the 19th Annual SIG Conference on Information Technology Education
              September 2018
              204 pages
              ISBN:9781450359542
              DOI:10.1145/3241815

              Copyright © 2018 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 14 September 2018

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              SIGITE '18 Paper Acceptance Rate24of59submissions,41%Overall Acceptance Rate176of429submissions,41%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader