A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Model Curriculum for Security Aspects in IT Education
ENGLISH
2005
DESIDOC Bulletin of Information Technology
ENGLISH
Security has become a primary concern in order to provide protected data transfer in all networking environments. ...
The laboratory will be unique in that it uses an isolated laboratory network that attempts to represent the internet as closely as possible to typical educational laboratories which use only a few physical ...
Hardware Requirements A general hardware setup is required for lab set up. High powered server and 15 to 20 nodes should suffice the purpose for a group of 20 students. ...
doi:10.14429/dbit.25.5.3667
fatcat:gqpsa5ck3jel7i2dpkwl3kwz3y
A Pervasive Computing Curriculum for Engineering and Science Students
2007
IEEE pervasive computing
With the support of the US National Science Foundation and Cisco, we implemented a multidisciplinary Pervasive Computing Lab and have developed relevant courses for both CE and CS students. ...
T oday, there's an urgent need for welltrained pervasive computing engineers and scientists. ...
Applications include detecting fires, earthquakes, water pollution, and homeland security intrusions. Our curriculum uses sensor networks as the educational platform of smart spaces. ...
doi:10.1109/mprv.2007.3
fatcat:cixri4toz5hkte4n3vudpimn5u
ARP spoofing
2009
2009 Information Security Curriculum Development Conference on - InfoSecCD '09
ARP spoofing attack, one of the most important security topics, is usually taught in courses such as Intrusion Detection in Local Area Networks (LANs). ...
It provides analysis based on practical experiments carried out on a number of security solutions regarding their ability to detect ARP spoofing. ...
INTRODUCTION Intrusion detection is one of the major security topics taught in network and information security courses. ...
doi:10.1145/1940976.1940989
fatcat:a5tsjczybnbwlf74je43rdzsfm
Towards Changes in Information Security Education
2006
Journal of Information Technology Education
, and intrusion detection systems. • More research has to be supported in programming languages. ...
In addition, Electronic Develop-A-Curriculum (EDACUM) program supports the development of a curriculum based on NSTISSI standards. ...
doi:10.28945/244
fatcat:t6egkxiugbgmzbxmbb7tynob3e
Computer forensics education
2003
IEEE Security and Privacy
Building a suitable workforce development program could support the rapidly growing field of computer and network forensics. ...
The academic community, for example, appears immersed in counterhacking technology, which stems largely from intrusion detection and survivability research. ...
As computers became more networked, computer forensics evolved into a term for post-incident analysis of computers victimized by intrusion or malicious code. ...
doi:10.1109/msecp.2003.1219052
fatcat:duttkxrnerbkrlxgp4cf67mkmq
A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study
2013
Journal of Information Technology Education Innovations in Practice
The paper discusses also common defense techniques for detecting DoS attacks, including Intrusion Detection Systems (IDS) and Software tools. ...
DoS attacks are important topics for security courses teaching ethical hacking and intrusion detection techniques. ...
IDS/IPS Hardware Devices IDS/IPS hardware devices are designed to detect and prevent malicious traffic and activities in computer networks. ...
doi:10.28945/1920
fatcat:yapzbe25xzhzzmoom4vwdzrq3q
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
2006
SIGARCH Computer Architecture News
This paper presents a high-availability system architecture called INDRA -an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor (or CMP) with novel security ...
We demonstrate and evaluate INDRA's capability and performance using real network services and a cycle-level architecture simulator. ...
Upon the receipt of a new network service request by a server application, the server will issue a request to the hardware. ...
doi:10.1145/1150019.1136520
fatcat:2cgtp3yiincg3j3o3lyjazv7t4
Information system security curricula development
2003
Proceeding of the 4th conference on Information technology education - CITC '03
Finally, this paper presents a graduate level information system security specialization that was developed using this information. ...
Moreover, for Research 1 institutions, any new security curriculum will likely only be seen as successful if it produces quality graduate students and a body of knowledge that will produce two results: ...
In addition to applying appropriate cryptographic methodologies to their own communications, organizations need intrusion detection to have assurance that their network infrastructure has not been compromised ...
doi:10.1145/947121.947178
dblp:conf/sigite/Crowley03
fatcat:7swyetqu2rauxkv5ysvmafpw3a
Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN
2020
IEEE Access
The authors propose a control plane-based orchestration for varied sophisticated threats and attacks. ...
However, the centralized control intelligence and programmability is primarily a potential target for the evolving cyber threats and attacks to throw the entire network into chaos. ...
In [26] , the authors propose a deep learning approach based on a deep neural network (DNN) for flow-based intrusion. ...
doi:10.1109/access.2020.3009849
fatcat:5p767sq2zvdojomdgg77wjs7cm
Cyber Security Body of Knowledge and Curricula Development
[chapter]
2018
Reimagining New Approaches in Teacher Professional Development
This research attempts to put basic step and a framework for cyber security body of knowledge and to allow practitioners and academicians to face the problem of lack of standardization. ...
The suggested body of knowledge may not be perfect, yet it is a step forward. ...
Accreditation Agency for Study Programmes in Health and Social Sciences (AHPGS), Agency for Quality Assurance and Accreditation of Canonical Study Programmes (AKAST), Agency for Quality Assurance and Accreditation ...
doi:10.5772/intechopen.77975
fatcat:u243fqi56fhuhfeufpimr5cayu
Educating Accounting Students On Computer Crime And Ethics
2011
Journal of Business & Economics Research
<span style="mso-spacerun: yes;"> </span>Finally, this paper suggests using a combination of three courses to educate accounting students on computer crime and ethics for preparation for their accounting ...
<span style="mso-spacerun: yes;"> </span>These three courses are a traditional Accounting Information Systems (AIS) course, a fraud prevention and detection or forensic accounting course, and an ...
In some cases, a single intrusion detection system may not be enough. Legitimate changes may be mistaken for unauthorized intrusions. ...
doi:10.19030/jber.v3i9.2811
fatcat:zqnhighwk5dnjcklfvugn4sdcm
Cyber security: challenges for society- literature review
2013
IOSR Journal of Computer Engineering
An Intrusion Detection System (IDS) is a program that analyses what happens or has happened during an execution and tries to find indications that the computer has been misused. ...
This paper focus on cyber security emerging trends while adopting new technologies such as mobile computing, cloud computing, e-commerce, and social networking. ...
Acknowledgment It gives us a great pleasure to submit the paper topic titled-Cyber Security: A Challenge To Society‖.We wish to take this opportunity to express our heartiest gratitude with pleasure to ...
doi:10.9790/0661-1226775
fatcat:ki2yjfgaovhnzgxxvm7e2zmby4
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
2007
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
Using industry-standard hardware and software, AFIT graduate students designed, built, and operated a robust network infrastructure that survived scans, denial of service attacks, social engineering, viruses ...
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defense Exercise (CDX) sponsored ...
Acknowledgements We thank the reviewers for their constructive and insightful comments. ...
doi:10.1109/hicss.2007.538
dblp:conf/hicss/MullinsLMTB07
fatcat:53gmx435yved5g73ai7ctdzv7i
Undergraduate University Education in Internet of Things Engineering in China: A Survey
2021
Education Sciences
We then provide suggestions for further development and exploration of IoT education by presenting a Technical Knowledge Map of IoT Engineering. ...
Based on data collected from faculties, students, and graduates, we found that the IoT Engineering curriculum was an unsystematic patchwork and was deficient in practical platforms. ...
intrusion detection, and virus detection. ...
doi:10.3390/educsci11050202
doaj:3158bd485fa5451db2c0e3cd0a771a4a
fatcat:nihrnrdwkfdztplf2es64y2z3q
Training the Cyber Warrior
[chapter]
2003
Security Education and Critical Infrastructures
This paper suggests the major educational components of a curriculum that is designed to educate individuals for job assignments as Information Assurance professionals -also known as: cyber warriors. ...
It suggests a minimum common body of knowledge for all cyber warriors along with two major specialization categories: cyber tacticians and cyber strategists. ...
The cyber tactician that has her network: 1) patched, 2) configured for least privilege, 3) scanned for vulnerabilities, 4) monitored by network and hostbased intrusion detection systems, 5) properly isolated ...
doi:10.1007/978-0-387-35694-5_24
fatcat:vcovvaxfvbgztcvghnw4bo5seu
« Previous
Showing results 1 — 15 out of 1,259 results