Using Visualization to Teach Security

Size: px
Start display at page:

Download "Using Visualization to Teach Security"

Transcription

1 Using Visualization to Teach Security Dino Schweitzer, Wayne Brown Academy Center for Cyberspace Research, United States Air Force Academy, CO Abstract. Interactive visualization tools have been shown to be an effective means for engaging students in the learning process. Such tools are a form of active learning that have been successfully applied to a wide variety of disciplines in the sciences, engineering, and humanities. Information security is a complex topic that can benefit from judicious design and application of classroom visualizations. At our institution, we have developed a series of interactive visualizations to teach students security concepts in different courses at different levels of experience. This paper describes the approach used to design and implement the visualizations, their use in the classroom, and our experience with their effectiveness in increasing student understanding. Keywords: Security education, visualization, active learning 1 Introduction There has been a great deal of emphasis in recent years on the importance of information security in higher education. This emphasis is a result of an increased awareness of security issues and vulnerabilities, expanded resources for security research, an increasing number of highly publicized attacks on vulnerable systems, and an increasing awareness of computer-related privacy issues. Security issues and principles have been identified as core topic areas for computer science education by the ACM and IEEE recommended curricula [1]. The Colloquium for Information Systems Security Education (CISSE) was founded in 1997 to provide a forum for promoting information security in higher education ( Different schools have taken different approaches for the most effective means of teaching security in undergraduate education. One approach is to integrate topics across the CS curriculum by adding lessons on security concepts in existing courses at the appropriate place [2][3]. A different approach is to create separate security courses and/or set up complete programs and concentrations in security [4][5][6]. Many educators have identified a laboratory component as important element of security education, along with the associated logistical and ethical challenges of teaching hacking tools [7][8][9]. The ability for students to get hands-on experience with current tools and techniques is motivational to students and provides a welcomed break from lectures. A critical aspect in security education is the basic distinction between training and education. Recognition of security professionals in industry is often based on training certificates obtained through well-respected providers. The Center for Academic

2 2 Dino Schweitzer, Wayne Brown Excellence (CAE) program for information assurance education was established by NSA and DHS to identify academic programs that meet stringent requirements in security curriculum and practice [10]. The curricula requirements for the designation, however, are based on mapping topics taught to national training standards. For computing professionals to effectively deal with security issues in the long term, knowledge of current tools and attacks is not sufficient. It is critical to understand the underlying concepts and theory. Effective means for providing that understanding is a challenge. The application of active learning techniques is one means of motivating and engaging students in the learning process [11]. In its simplest form, active learning has been described as involving students in the classroom in activities other than listening that are meaningful and make them think about what they are doing [12]. Such activities can cover a wide variety of techniques from simple classroom dialoging to complex role-playing. A summary of simple techniques that can be applied in any setting can be found in [13]. Visualization can be used to create an active learning environment that effectively teaches security principles. 2. Visualization in the Classroom The use of visualizations to teach computer science concepts has been applied across many topics for several years. The earliest and most documented examples are in the area of algorithm animations [14]. The advent of flash animation and web applets accelerated the number of visualizations available to educators. Web searches can find examples for many computer science courses such as algorithms, data structures, graph theory, computer graphics, automata theory, programming languages, computer security, and hardware demonstrations. The effectiveness of visualizations as an educational tool has been debated in the literature with mixed results [15]. Looking specifically at algorithm visualizations, Saraiya, et. al., attempted to identify key features of successful visualizations [16]. The results of experiments demonstrated that careful design could measurably increase students' understanding of algorithms. In security, visualization has a more recent history as a tool of cyber-defense [17]. Security, and especially network security, is a data-rich environment that benefits from the abstraction and understanding of complex relationships that visualization provides. Several visualization tools have been developed and documented in the security literature to provide such capabilities as intrusion detection, real-time monitoring, data mining and analysis, network traffic analysis, security log investigation, and computer forensics. These tools can make effective classroom demonstrations; however, they are not designed as educational aides for teaching concepts. 2.1 Interactive Classroom Visualizations (ICV s) Interactive classroom visualization (ICV) is a term coined for a visualization tool specifically designed for use in the classroom as an active learning technique [18].

3 Using Visualization to Teach Security 3 The fundamental goal of ICV s is different than normal security visualizations. Typical visualizations are designed to explore and understand data, to identify patterns, to explore relationships, and to monitor activity. ICV s, on the other hand are specifically designed to illustrate concepts such as algorithms, formal models, or processes. As an example, Figure 1 is a sample screen shot from an ICV to teach students the concepts around security protocols. Fig. 1. Screen shot of security protocol ICV. Some of the key design considerations when developing ICV s are: High degree of interactivity for students, including the ability to back up a step to see what just happened and be able to replay it High level of control over environment to allow students to set up specific scenarios or experiment with what if a given situation occurs Visual abstractions that are easy to understand and can be grasped quickly in a classroom environment; also important to maintain consistent representation for similar tools Narrow focus to a single / limited number of concepts to keep the visualization relatively short and not confuse different ideas Selecting concepts to represent that are seen as relevant and benefit from interactive visualization avoid eye candy A robust user interface that can handle inexperienced users and gracefully deal with erroneous input limiting student frustration 2.2 Security ICV s

4 4 Dino Schweitzer, Wayne Brown At the Air Force Academy, we have developed a series of ICV s for teaching security concepts in our classes. These are used in introductory computer classes taken by all cadets, in computer science major s courses, and in security-specific courses such as Cryptography and Information Warfare. Tools are categorized as follows: High level security concepts: tools that demonstrate a general concept such as Public Key Infrastructure Formal models: tools that demonstrate a formal model in security such as access control models Algorithms: tools that demonstrate a specific process or algorithm in security such as a specific encryption approach Low level security concepts: details of specific security concepts such as types of attacks on different encryption methods These categories are somewhat arbitrary, and many tools fit into more than one. The complete list of tools and their brief descriptions are shown in Table 1. A complete description of all of the tools is not possible here, but have been presented in various publications [19][20][21][22]. Table 1. Security ICV s, categories, and descriptions Tool Category Brief Description PKIVis High Level Demonstrates concepts of public key infrastructure in a game-like environment GRASP High Level Illustrates the use of security protocols and various attacks and counters TakeGrant Formal Model Allows user to create a Take-Grant protection system and demonstrate safety HRUVis Formal Model Implements a sample Harrison, Ruzzo, and Ullman access control model and allows users to demonstrate safety issues BBCVis Algorithm Demonstrates jam resistant communication using concurrent codes and BBC algorithm Ciphers Algorithms/ Seven different cipher applets that demonstrate Low Level specific encryption algorithms, weaknesses, and attacks CodeBlue Low Level Demonstrates relocatable code in a game-like environment similar to Core War 3. Some Examples Some specific examples will be used to describe the overall design philosophy and general approach to security ICV s. In our Cryptography class, we teach several historical and modern cipher algorithms, explain weaknesses and attacks, and perform numerical analyses. To help students understand the various algorithms, we have

5 Using Visualization to Teach Security 5 developed a series of interactive applets that visually show the cipher operation, various characteristics of the cipher including weaknesses, and possible ways of breaking the cipher. All of the ciphers follow a similar visual format to provide continuity to the students as to function and abstraction. For example, Figure 2 shows screen shots from two of the applets. The left cipher is a simple substitution cipher that students are very familiar with. The right screen shows the Vigenere cipher, a historically significant cipher in the sense that it was thought secure for many years before being shown to be easily broken. The layout of the tools is very similar with information regarding plaintext, keys, and ciphertext in similar locations. Students have the ability to select the plaintext and the key so they can experiment with the effect of different values. Tabbed panes are used to isolate specific characteristics or attacks on the ciphers. These may be static displays, as the case of two-letter diagram frequencies shown for the substitution cipher, or interactive as the sliding letter frequency on the right. The classroom instructor can demonstrate very quickly how to break the Vigenere cipher by interactively sliding through different possible key letter values until a best fit in letter frequency occurs. To prove this to the students, the secret button creates an unknown plaintext, shows the ciphertext, and it is up to the student to break the code and discover the plaintext. Fig. 2. Screen shots from cipher applets. Figure 3 shows an example of an ICV for teaching a formal model in security, in this example the Take-Grant protection model. Students graphically create a protection scheme environment on the right and create commands in the model that demonstrate how protection rights can be transferred. Formal models are important for security students to understand as a means to evaluate proposed security schemes, their capabilities and limitations. In this example, students demonstrate that a given protection scheme is unsafe by creating a set of commands that, when executed, transfer a given right to a given subject. The ICV allows the student to single step through the commands, see the effects on the graphical display, and back up if they

6 6 Dino Schweitzer, Wayne Brown want to better understand what just happened. They also have complete control to set up the environment, edit the commands, and create a graphical layout that is easy to visualize what is happening. Fig. 3. Screen shot for Take-Grant formal protection model ICV. 4. Classroom Use The security ICV s are not designed as standalone educational demonstrations, although they could be embedded on a web page with explanatory text. They are primarily designed as a lecture enhancement to provide an interactive visual component to the classroom. Typically, the instructor explains a concept and demonstrates the concept with the ICV. To engage the students, the instructor can give the students the tools to experiment with along with a set of problems or questions to answer, either in class or as an outside exercise. Another effective approach is to play what if games in the class, where after demonstrating the tool s use, the instructor sets up a different environment and asks the students to predict what the effects will be. Or, the instructor challenges the students to use the tool in front of their peers to complete a task, such as breaking a cipher. The tools can be used by individual students, or as a collaborative exercise for student teams. 5. Our Experience / Future Plans We have used these ICV s in various classes over the past three years. Our program is small, so it is difficult to perform an objective study of their effectiveness in terms of a control group and measuring differences in performance on concept assessment. Student reaction has been very positive. They consistently rate the use of ICV s as enjoyable on course critiques and favorably interact with them in the classroom. We have given students problems to complete with the tools outside of class, and they have a high success rate. Based on the success of the formal model tools, we were able to reduce the number of lectures dedicated to teaching the models. The cipher

7 Using Visualization to Teach Security 7 applets are popular for teaching basic concepts and have been used in our summer orientation program for high school students as a fun activity. Thus, even without a formal evaluation of their educational effectiveness, the motivational aspects of using them as a form of active learning encourages us to continue their use. Our future plans are to continue using the existing tools, refining them and correcting any bugs. In addition, a number of additional tools are under investigation for possible development including worm propagation, buffer overflow (some tools currently exist online for this), and other formal models. We have put some of the tools on a web page for students to access, but do not have a distance learning element at our school, so have not investigated using them in an e-learning environment. The tools are available for public use upon request. Contact the author for further information. References 1. Computing Curricula 2005, education/cc2001/cc2005-march06final.pdf 2. Petrova, K., Philpott, A., Kaskenpalo, P., and Buchan, J Embedding information security curricula in existing programmes. In Proceedings of the 1st Annual Conference on information Security Curriculum Development (Kennesaw, Georgia, October 08-08, 2004). InfoSecCD '04. ACM Press, New York, NY, Vaughn, R. B., Dampier, D. A., and Warkentin, M. B Building an information security education program. In Proceedings of the 1st Annual Conference on information Security Curriculum Development (Kennesaw, Georgia, October 08-08, 2004). InfoSecCD '04. ACM Press, New York, NY, Azadegan, S., Lavine, M., O'Leary, M., Wijesinha, A., and Zimand, M An undergraduate track in computer security. In Proceedings of the 8th Annual Conference on innovation and Technology in Computer Science Education (Thessaloniki, Greece, June 30 - July 02, 2003). D. Finkel, Ed. ITiCSE '03. ACM Press, New York, NY, Bacon, T. and Tikekar, R Experiences with developing a computer security information assurance curriculum. J. Comput. Small Coll. 18, 4 (Apr. 2003), Crowley, E Information system security curricula development. In Proceeding of the 4th Conference on information Technology Curriculum (Lafayette, Indiana, USA, October 16-18, 2003). CITC4 '03. ACM Press, New York, NY, Mattord, H. J. and Whitman, M. E Planning, building and operating the information security and assurance laboratory. In Proceedings of the 1st Annual Conference on information Security Curriculum Development (Kennesaw, Georgia, October 08-08, 2004). InfoSecCD '04. ACM Press, New York, NY, Haynes, A. and Stratton, T. Cyber Defense 2003 & Information Assurance Education. In Proceedings IEEE 2003 International Conference on Systems, man & Cybernetics. Oct Schafer, J., Ragsdale, D. J., Surdu, J. R., and Carver, C. A The IWAR range: a laboratory for undergraduate information assurance education. In Proceedings of the Sixth Annual CCSC Northeastern Conference on the Journal of Computing in Small Colleges (Middlebury, Vermont, United States). Consortium for Computing Sciences in Colleges. Consortium for Computing Sciences in Colleges, Schweitzer, D., Humphries, J., and Baird, L., "Meeting the criteria for a center of academic excellence (CAE) in information assurance education," J. Comput. Small Coll. October 2006.

8 8 Dino Schweitzer, Wayne Brown 11. Chickering, A. and Gamson, Z. Seven principles of good practice in undergraduate education. AAHE Bulletin, 39, pp. 3-7, Bonwell, C., and Eison, J. Active Learning: Creating Excitement in the Classroom. ASHE- ERIC Higher Education Report 1, Paulson, D. and Faust, J. Active learning in the college classroom. Journal on Excellence in College Teaching, vol. 9 (2), pp. 3-24, Brown, M. Perspectives on algorithm animation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Washington, D.C., United States, May 15-19, 1988). J. J. O'Hare, Ed. CHI '88. pp Hundhausen, C., Douglas, S., and Stasko, J. A meta-study of algorithm visualization effectiveness. Journal of Visual Languages and Computing 13, pp , Saraiya, P., Shaffer, C. A., McCrickard, D. S., and North, C. Effective features of algorithm visualizations. In Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education (Norfolk, Virginia, USA, March 03-07, 2004). SIGCSE '04, pp Ma, K Cyber security through visualization. In Proceedings of the 2006 Asia-Pacific Symposium on information Visualisation - Volume 60 (Tokyo, Japan). K. Misue, K. Sugiyama, and J. Tanaka, Eds. ACM International Conference Proceeding Series, vol Australian Computer Society, Darlinghurst, Australia, Schweitzer, D. and Brown, W., Interactive Visualization for the Active Learning Classroom, Proceedings of the 38th ACM Technical Symposium on Computer Science Education, SIGSCE 2007, March Ebeling, D. and Santos, R. Public Key Infrastructure Visualization, J. Comput. Small Coll. October Schweitzer D., Baird L., Collins M., Brown W., Sherman M., "GRASP: A visualization tool for teaching security protocols," Proceedings of the 10th Colloquium for Information Systems Security Education, June Schweitzer D. and Baird L., "The design and use of interactive visualization applets for teaching ciphers," Proceedings of the 7th IEEE Workshop on Information Assurance, June Schweitzer D., Collins M., Baird L., "A Visual Approach to Teaching Formal Access Models in Security," Proceedings of the 11th Colloquium for Information Systems Security Education, June 2007.

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT

DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental

More information

NETWORK FIREWALL VISUALIZATION IN THE CLASSROOM *

NETWORK FIREWALL VISUALIZATION IN THE CLASSROOM * NETWORK FIREWALL VISUALIZATION IN THE CLASSROOM * 1st Lieutenant Justin Warner, 1st Lieutenant David Musielewicz, 1st Lieutenant G. Parks Masters, 1st Lieutenant Taylor Verett, 1st Lieutenant Robert Winchester

More information

Information Security Curriculum Creation: A Case Study

Information Security Curriculum Creation: A Case Study Information Security Curriculum Creation: A Case Study Bradley Bogolea College of Engineering The Pennsylvania State University University Park, Pa 16802 [email protected] Kay Wijekumar School of Information

More information

Undergraduate Computer Security Education: A Report on our Experiences & Learning

Undergraduate Computer Security Education: A Report on our Experiences & Learning Undergraduate Computer Security Education: A Report on our Experiences & Learning Shiva Azadegan Michael O Leary Alexander Wijesinha Marius Zimand Towson University Abstract: Key words: We describe our

More information

Information Assurance Program at West Point

Information Assurance Program at West Point Information Assurance Program at West Point [email protected] John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

A Preliminary Evaluation of the new Cisco Network Security Course

A Preliminary Evaluation of the new Cisco Network Security Course IJCSNS International Journal of Computer Science and Network Security, VOL.0 No.9, September 00 A Preliminary Evaluation of the new Cisco Network Security Course S P Maj, D Veal, L Yassa Edith Cowan University,

More information

TEACHING INTRODUCTORY COMPUTER GRAPHICS WITH THE PROCESSING LANGUAGE

TEACHING INTRODUCTORY COMPUTER GRAPHICS WITH THE PROCESSING LANGUAGE TEACHING INTRODUCTORY COMPUTER GRAPHICS WITH THE PROCESSING LANGUAGE Dino Schweitzer, Jeff Boleng, Paul Graham United States Air Force Academy, CO 80840 [email protected] ABSTRACT Different approaches

More information

COMPUTER SECURITY EDUCATION

COMPUTER SECURITY EDUCATION COMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden University of Idaho, Indiana University of Pennsylvania, and Northern Kentucky University Abstract: Keywords:

More information

Facilitating Students Collaboration and Learning in a Question and Answer System

Facilitating Students Collaboration and Learning in a Question and Answer System Facilitating Students Collaboration and Learning in a Question and Answer System Chulakorn Aritajati Intelligent and Interactive Systems Laboratory Computer Science & Software Engineering Department Auburn

More information

An Information Assurance and Security Curriculum Implementation

An Information Assurance and Security Curriculum Implementation Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,

More information

Animating Programs and Students in the Laboratory

Animating Programs and Students in the Laboratory Animating Programs and Students in the Laboratory James F. Korsh Paul S. LaFollette, Jr. Department of Computer and Information Sciences Temple University Philadelphia, PA 19122 Raghvinder Sangwan Department

More information

Teaching Game Development: At the Intersection of Computer Science and Humanities & Arts

Teaching Game Development: At the Intersection of Computer Science and Humanities & Arts Teaching Game Development: At the Intersection of Computer Science and Humanities & Arts David Finkel, Mark Claypool, Michael A. Gennert Department of Computer Science Fred Bianchi, Dean O Donnell, Patrick

More information

Toward Curricular Guidance in the Cyber Sciences

Toward Curricular Guidance in the Cyber Sciences Toward Curricular Guidance in the Cyber Sciences 1 6 J U N E 2 0 1 5 2 0 1 5 C I S S E L A S V E G A S D A V I D G I B S O N, U S A I R F O R C E A C A D E M Y B E T H H A W T H O R N E, U N I O N C O

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach Rahul V. Tikekar Southern Oregon University Abstract: Increasing awareness of the vulnerabilities of computer systems has led to the introduction

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

The Effectiveness of Games as Assignments in an Introductory Programming Course

The Effectiveness of Games as Assignments in an Introductory Programming Course The Effectiveness of Games as Assignments in an Introductory Programming Course Abstract - Computer games are an often cited motivational tool used as assignments in introductory programming courses. This

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Tutorial 3. June 8, 2015

Tutorial 3. June 8, 2015 Tutorial 3 June 8, 2015 I. Basic Notions 1. Multiple-choice (Review Questions Chapter 6, 8 and 11) 2. Answers by a small paragraph (Chapter 2: viruses: MBR, rootkits, ) Multiple choice X. Which is the

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

Effective Features of Algorithm Visualizations

Effective Features of Algorithm Visualizations Effective Features of Algorithm Visualizations Purvi Saraiya, Clifford A. Shaffer, D. Scott McCrickard and Chris North Department of Computer Science Virginia Tech Blacksburg, VA 24061 {psaraiya shaffer

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

Active and Collaborative Learning through a Blog Network

Active and Collaborative Learning through a Blog Network Active and Collaborative Learning through a Blog Network Jack Zheng Southern Polytechnic State University [email protected] ABSTRACT This paper describes a team blog network method designed for a graduate

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 [email protected] Kyle Gwinnup and Carol

More information

A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW

A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW John C. Knight, Jane C. Prey, & Wm. A. Wulf Department of Computer Science University of Virginia ABSTRACT

More information

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional

More information

Bachelor of Information Technology

Bachelor of Information Technology Bachelor of Information Technology Detailed Course Requirements The 2016 Monash University Handbook will be available from October 2015. This document contains interim 2016 course requirements information.

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Building the Next Generation of Computer Security Professionals. Chris Simpson

Building the Next Generation of Computer Security Professionals. Chris Simpson Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons

More information

Guide for Designing Cyber Security Exercises

Guide for Designing Cyber Security Exercises Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA [email protected] ADRIAN

More information

Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course

Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course Art Conklin Center for Infrastructure Assurance and Security The University of Texas at

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

GSPIM: Graphical Visualization Tool for MIPS Assembly

GSPIM: Graphical Visualization Tool for MIPS Assembly GSPIM: Graphical Visualization Tool for MIPS Assembly Programming and Simulation Patrick Borunda Science University of Arizona [email protected] Chris Brewer Science University of Arizona [email protected]

More information

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Course Description: Concepts and issues in physical and cyber security; technological vulnerabilities

More information

Information Security in Big Data using Encryption and Decryption

Information Security in Big Data using Encryption and Decryption International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor

More information

Diagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements,

Diagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements, Diagram of Security Marek Vysoký Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Letná 9, 042 00 Košice, Slovakia [email protected]

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

STUDENT ENGAGEMENT IN ONLINE COURSES

STUDENT ENGAGEMENT IN ONLINE COURSES STUDENT ENGAGEMENT IN ONLINE COURSES Sarah L. Mabrouk Framingham State University 100 State Street, PO Box 9101, Framingham, MA 01701-9101 [email protected] Teaching in the classroom, face-to-face,

More information

A New Undergraduate Major: Interactive Media and Game Development

A New Undergraduate Major: Interactive Media and Game Development A New Undergraduate Major: Interactive Media and Game Development David Finkel, Mark Claypool, Michael A. Gennert Department of Computer Science Fred Bianchi, Dean O Donnell, Patrick Quinn Department of

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]

More information

Learn About Computer Network Security - A Review

Learn About Computer Network Security - A Review http://www.diva-portal.org Postprint This is the accepted version of a paper presented at International Conference on Learning and Teaching in Computing and Engineering (LaTiCE) 2014, 11-13 April 2014,

More information

How To Teach Students To Program A Virtual World

How To Teach Students To Program A Virtual World Gaming for Middle School Students: Building Virtual Worlds CHARLES R. HARDNETT Spelman College Computer Science Department Atlanta, GA 30314 [email protected] ABSTRACT We can begin engaging new talented

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

Scott McElfresh 209 Belmont Circle, Farmville, VA 23901 [email protected] (434) 315-0055

Scott McElfresh 209 Belmont Circle, Farmville, VA 23901 ScottMcElfresh@acm.org (434) 315-0055 Scott McElfresh 209 Belmont Circle, Farmville, VA 23901 [email protected] (434) 315-0055 EDUCATION: Dartmouth College, Hanover, New Hampshire M.S. in Computer Science, 1994 PhD in Computer Science,

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Introducing PyLighter: Dynamic Code Highlighter

Introducing PyLighter: Dynamic Code Highlighter Introducing PyLighter: Dynamic Code Highlighter Michael G. Boland and Curtis Clifton Department of Computer Science and Software Engineering Rose-Hulman Institute of Technology 5500 Wabash Ave. Terre Haute,

More information

Future of Digital Forensics: A Survey of Available Training

Future of Digital Forensics: A Survey of Available Training Future of Digital Forensics: A Survey of Available Training A. Evans, A. Williams, and J. Graham Computer Science Department, Norfolk State University, Norfolk, VA USA Abstract The field of forensics is

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California

More information

By Purnima Valiathan Head Instructional Design Team Knowledge Platform

By Purnima Valiathan Head Instructional Design Team Knowledge Platform INTERACTIVITY IN E-LEARNING By Purnima Valiathan Head Instructional Design Team Knowledge Platform Knowledge Platform White Paper April 2006 Knowledge Platform 19 China Street #03-02 Far East Square Singapore

More information

A Simulation Game for Teaching Secure Data Communications Protocols

A Simulation Game for Teaching Secure Data Communications Protocols A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the

More information

Network Security: A Case Study

Network Security: A Case Study Network Security: A Case Study Susan J. Lincke Computer Science Department University of Wisconsin-Parkside Kenosha, WI [email protected] Abstract This paper reviews 3 case studies related to network security.

More information

TRUST:Team for Research in Ubiquitous Secure Technologies

TRUST:Team for Research in Ubiquitous Secure Technologies TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider

More information

REMOVING THE DISTANCE FROM DISTANCE EDUCATION: STRATEGIES FOR SUCCESSFUL STUDENT ENGAGEMENT AND COLLABORATION

REMOVING THE DISTANCE FROM DISTANCE EDUCATION: STRATEGIES FOR SUCCESSFUL STUDENT ENGAGEMENT AND COLLABORATION Removing Distance from Distance Education 1 REMOVING THE DISTANCE FROM DISTANCE EDUCATION: STRATEGIES FOR SUCCESSFUL STUDENT ENGAGEMENT AND COLLABORATION Lisa Logan Rich, Athens State University Wendy

More information

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION Amruth N. Kumar (Moderator) Ramapo College of New Jersey, Mahwah, NJ [email protected] Jack Beidler University of Scranton, PA [email protected]

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

Lemonade Stand Instructor Guide

Lemonade Stand Instructor Guide Lemonade Stand Using GoVenture In Your Learning Environment Contents 1. Welcome... 3 2. About GoVenture Lemonade Stand... 4 3. What Makes GoVenture Lemonade Stand Unique... 5 4. GoVenture for You... 6

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

INFORMATION SYSTEMS (INFO)

INFORMATION SYSTEMS (INFO) VCU 1 INFORMATION SYSTEMS (INFO) INFO 160. Digital Literacy: Computer Concepts, Internet, Digital Devices. 1 Hour. Semester course; 1 credit. Overview of basic computer concepts, the Internet, new technologies

More information

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra

More information

How To Train On Information Security

How To Train On Information Security Stimulating Software Security Education at Community Colleges Through Training Workshops Akbar Siami Namin Computer Science Department Texas Tech University Lubbock, TX, USA [email protected] Fethi A.

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

Dana VÎLCU Spiru Haret University Faculty of Mathematics and Informatics. [email protected]

Dana VÎLCU Spiru Haret University Faculty of Mathematics and Informatics. d.vilcu.mi@spiruharet.ro Dana VÎLCU Spiru Haret University Faculty of Mathematics and Informatics [email protected] Why beeing mobile Gadgets change the world:! Third world Health Sport Distance learning 13.06.2014 CAMAI2014

More information