1,259 Hits in 5.4 sec

A Model Curriculum for Security Aspects in IT Education

Ashwani Kush, Sawtantar Singh
2005 DESIDOC Bulletin of Information Technology  
Security has become a primary concern in order to provide protected data transfer in all networking environments.  ...  The laboratory will be unique in that it uses an isolated laboratory network that attempts to represent the internet as closely as possible to typical educational laboratories which use only a few physical  ...  Hardware Requirements A general hardware setup is required for lab set up. High powered server and 15 to 20 nodes should suffice the purpose for a group of 20 students.  ... 
doi:10.14429/dbit.25.5.3667 fatcat:gqpsa5ck3jel7i2dpkwl3kwz3y

A Pervasive Computing Curriculum for Engineering and Science Students

Fei Hu, Ankur Teredesai
2007 IEEE pervasive computing  
With the support of the US National Science Foundation and Cisco, we implemented a multidisciplinary Pervasive Computing Lab and have developed relevant courses for both CE and CS students.  ...  T oday, there's an urgent need for welltrained pervasive computing engineers and scientists.  ...  Applications include detecting fires, earthquakes, water pollution, and homeland security intrusions. Our curriculum uses sensor networks as the educational platform of smart spaces.  ... 
doi:10.1109/mprv.2007.3 fatcat:cixri4toz5hkte4n3vudpimn5u

ARP spoofing

Zouheir Trabelsi, Wassim El-Hajj
2009 2009 Information Security Curriculum Development Conference on - InfoSecCD '09  
ARP spoofing attack, one of the most important security topics, is usually taught in courses such as Intrusion Detection in Local Area Networks (LANs).  ...  It provides analysis based on practical experiments carried out on a number of security solutions regarding their ability to detect ARP spoofing.  ...  INTRODUCTION Intrusion detection is one of the major security topics taught in network and information security courses.  ... 
doi:10.1145/1940976.1940989 fatcat:a5tsjczybnbwlf74je43rdzsfm

Towards Changes in Information Security Education

Mariana Hentea, Harpal S. Dhillon, Manpreet Dhillon
2006 Journal of Information Technology Education  
, and intrusion detection systems. • More research has to be supported in programming languages.  ...  In addition, Electronic Develop-A-Curriculum (EDACUM) program supports the development of a curriculum based on NSTISSI standards.  ... 
doi:10.28945/244 fatcat:t6egkxiugbgmzbxmbb7tynob3e

Computer forensics education

A. Yasinsac, R.F. Erbacher, D.G. Marks, M.M. Pollitt, P.M. Sommer
2003 IEEE Security and Privacy  
Building a suitable workforce development program could support the rapidly growing field of computer and network forensics.  ...  The academic community, for example, appears immersed in counterhacking technology, which stems largely from intrusion detection and survivability research.  ...  As computers became more networked, computer forensics evolved into a term for post-incident analysis of computers victimized by intrusion or malicious code.  ... 
doi:10.1109/msecp.2003.1219052 fatcat:duttkxrnerbkrlxgp4cf67mkmq

A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study

Zouheir Trabelsi, Walid Ibrahim
2013 Journal of Information Technology Education Innovations in Practice  
The paper discusses also common defense techniques for detecting DoS attacks, including Intrusion Detection Systems (IDS) and Software tools.  ...  DoS attacks are important topics for security courses teaching ethical hacking and intrusion detection techniques.  ...  IDS/IPS Hardware Devices IDS/IPS hardware devices are designed to detect and prevent malicious traffic and activities in computer networks.  ... 
doi:10.28945/1920 fatcat:yapzbe25xzhzzmoom4vwdzrq3q

An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors

Weidong Shi, Hsien-Hsin S. Lee, Laura `Falk, Mrinmoy Ghosh
2006 SIGARCH Computer Architecture News  
This paper presents a high-availability system architecture called INDRA -an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor (or CMP) with novel security  ...  We demonstrate and evaluate INDRA's capability and performance using real network services and a cycle-level architecture simulator.  ...  Upon the receipt of a new network service request by a server application, the server will issue a request to the hardware.  ... 
doi:10.1145/1150019.1136520 fatcat:2cgtp3yiincg3j3o3lyjazv7t4

Information system security curricula development

Ed Crowley
2003 Proceeding of the 4th conference on Information technology education - CITC '03  
Finally, this paper presents a graduate level information system security specialization that was developed using this information.  ...  Moreover, for Research 1 institutions, any new security curriculum will likely only be seen as successful if it produces quality graduate students and a body of knowledge that will produce two results:  ...  In addition to applying appropriate cryptographic methodologies to their own communications, organizations need intrusion detection to have assurance that their network infrastructure has not been compromised  ... 
doi:10.1145/947121.947178 dblp:conf/sigite/Crowley03 fatcat:7swyetqu2rauxkv5ysvmafpw3a

Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN

Jahanzaib Malik, Adnan Akhunzada, Iram Bibi, Muhammad Imran, Arslan Musaddiq, Sung Won Kim
2020 IEEE Access  
The authors propose a control plane-based orchestration for varied sophisticated threats and attacks.  ...  However, the centralized control intelligence and programmability is primarily a potential target for the evolving cyber threats and attacks to throw the entire network into chaos.  ...  In [26] , the authors propose a deep learning approach based on a deep neural network (DNN) for flow-based intrusion.  ... 
doi:10.1109/access.2020.3009849 fatcat:5p767sq2zvdojomdgg77wjs7cm

Cyber Security Body of Knowledge and Curricula Development [chapter]

Evon M Abu-Taieh, Auhood Abd. Al Faries, Shaha T. Alotaibi, Ghadah Aldehim
2018 Reimagining New Approaches in Teacher Professional Development  
This research attempts to put basic step and a framework for cyber security body of knowledge and to allow practitioners and academicians to face the problem of lack of standardization.  ...  The suggested body of knowledge may not be perfect, yet it is a step forward.  ...  Accreditation Agency for Study Programmes in Health and Social Sciences (AHPGS), Agency for Quality Assurance and Accreditation of Canonical Study Programmes (AKAST), Agency for Quality Assurance and Accreditation  ... 
doi:10.5772/intechopen.77975 fatcat:u243fqi56fhuhfeufpimr5cayu

Educating Accounting Students On Computer Crime And Ethics

Eddie Metrejean, Howard G. Smith, Dennis Elam
2011 Journal of Business & Economics Research  
<span style="mso-spacerun: yes;">&nbsp; </span>Finally, this paper suggests using a combination of three courses to educate accounting students on computer crime and ethics for preparation for their accounting  ...  <span style="mso-spacerun: yes;">&nbsp; </span>These three courses are a traditional Accounting Information Systems (AIS) course, a fraud prevention and detection or forensic accounting course, and an  ...  In some cases, a single intrusion detection system may not be enough. Legitimate changes may be mistaken for unauthorized intrusions.  ... 
doi:10.19030/jber.v3i9.2811 fatcat:zqnhighwk5dnjcklfvugn4sdcm

Cyber security: challenges for society- literature review

Atul M Tonge
2013 IOSR Journal of Computer Engineering  
An Intrusion Detection System (IDS) is a program that analyses what happens or has happened during an execution and tries to find indications that the computer has been misused.  ...  This paper focus on cyber security emerging trends while adopting new technologies such as mobile computing, cloud computing, e-commerce, and social networking.  ...  Acknowledgment It gives us a great pleasure to submit the paper topic titled-Cyber Security: A Challenge To Society‖.We wish to take this opportunity to express our heartiest gratitude with pleasure to  ... 
doi:10.9790/0661-1226775 fatcat:ki2yjfgaovhnzgxxvm7e2zmby4

The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology

Barry Mullins, Timothy Lacey, Robert Mills, Joseph Trechter, Samuel Bass
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
Using industry-standard hardware and software, AFIT graduate students designed, built, and operated a robust network infrastructure that survived scans, denial of service attacks, social engineering, viruses  ...  This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defense Exercise (CDX) sponsored  ...  Acknowledgements We thank the reviewers for their constructive and insightful comments.  ... 
doi:10.1109/hicss.2007.538 dblp:conf/hicss/MullinsLMTB07 fatcat:53gmx435yved5g73ai7ctdzv7i

Undergraduate University Education in Internet of Things Engineering in China: A Survey

Bing Du, Yuke Chai, Wei Huangfu, Rongjuan Zhou, Huansheng Ning
2021 Education Sciences  
We then provide suggestions for further development and exploration of IoT education by presenting a Technical Knowledge Map of IoT Engineering.  ...  Based on data collected from faculties, students, and graduates, we found that the IoT Engineering curriculum was an unsystematic patchwork and was deficient in practical platforms.  ...  intrusion detection, and virus detection.  ... 
doi:10.3390/educsci11050202 doaj:3158bd485fa5451db2c0e3cd0a771a4a fatcat:nihrnrdwkfdztplf2es64y2z3q

Training the Cyber Warrior [chapter]

J. D. Fulp
2003 Security Education and Critical Infrastructures  
This paper suggests the major educational components of a curriculum that is designed to educate individuals for job assignments as Information Assurance professionals -also known as: cyber warriors.  ...  It suggests a minimum common body of knowledge for all cyber warriors along with two major specialization categories: cyber tacticians and cyber strategists.  ...  The cyber tactician that has her network: 1) patched, 2) configured for least privilege, 3) scanned for vulnerabilities, 4) monitored by network and hostbased intrusion detection systems, 5) properly isolated  ... 
doi:10.1007/978-0-387-35694-5_24 fatcat:vcovvaxfvbgztcvghnw4bo5seu
« Previous Showing results 1 — 15 out of 1,259 results