Filters








272,418 Hits in 3.6 sec

Control-Alt-Hack

Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of-and alter perceptions regarding-computer security.  ...  As of May 2013, we have shipped approximately 800 free copies to 150 educators.  ...  Given our target audience (Section 2.3), our goal of creating enthusiasm for computer security and computer science (Perception Goals), and our desire to reach a broad audience (Exposure Goal), we needed  ... 
doi:10.1145/2508859.2516753 dblp:conf/ccs/DenningLSK13 fatcat:6dvvkgd3cnfzrnxzaovoxqvffi

Teaching secure coding

Blair Taylor, Matt Bishop, Diana Burley, Steve Cooper, Ron Dodge, Robert Seacord
2012 Proceedings of the 43rd ACM technical symposium on Computer Science Education - SIGCSE '12  
Require at least one computer security course for all college students: a.  ...  Ron is the vice-chair for the Colloquium for Information Systems Security Education (CISSE), Secretary for the IFIP TC 11.8 working group on Information Security Education, and on the executive committee  ... 
doi:10.1145/2157136.2157304 dblp:conf/sigcse/TaylorBBCDS12 fatcat:zic3fo7csjgdzircqw5scvtr4e

Computer security education: training, scholarship, and research

M. Bishop
2002 Computer  
Computer Security Education: Training, Scholarship, and Research S ince 9/11, we are increasingly aware of threats to security and computer system vulnerabilities.  ...  We are also more aware of the need to educate the workforce quickly and effectively. Traditionally, computer security education falls into two distinct classes.  ...  The goal is to go beyond existing technologies to find new ways and new mechanisms to improve the state of computer security.  ... 
doi:10.1109/mc.2002.1012429 fatcat:vp6kdt4b65g5vkoppxmk4afi6m

Integrating security into the curriculum

C.E. Irvine, Shiu-Kai Chin
1998 Computer  
Cybersquare Computer security can be used as a vehicle to achieve accreditation goals for computer science and engineering programs, while at the same time engaging students with relevant, exciting topics  ...  The authors' approach, based on educational outcomes, illustrates that security topics can contribute to an engineering program by fostering all skills required to produce graduates capable of critical  ...  COMPUTER SECURITY IN EDUCATION Two important criteria for selecting outcomes for information security education are as follows: • The education must result in graduates prepared for the security challenges  ... 
doi:10.1109/2.735847 fatcat:pf56lz3ksvet5hmkoiooiuezc4

Panel on integrating security concepts into existing computer courses

Paul Mullins, Jim Wolfe, Michael Fry, Erik Wynters, William Calhoun, Robert Montante, William Oblitey
2002 Proceedings of the 33rd SIGCSE technical symposium on Computer science education - SIGCSE '02  
Additional goals include development of modules related to security for CS core courses, and an interdisciplinary minor for Computer Science and Criminology majors.  ...  On the other hand, security consciousness, as part of good citizenship, can be recognized as an important goal for an introductory course in computer science.  ... 
doi:10.1145/563340.563480 dblp:conf/sigcse/MullinsWFWCMO02 fatcat:n7hltwqyxna3rmpuyalpbzjqqa

Secure comics: an interactive comic series for improving cyber security and privacy

Leah Zhang-Kennedy, Robert Biddle Carleton, Sonia Chiasson Carleton
2017 HCI 2017  
We designed, illustrated, and developed Secure Comics, an online educational interactive comic series about cyber security and privacy.  ...  The three-part comic was evaluated with adults and children, and had positive effects on users understanding of security and privacy information, and improved their secure and privacy-aware behaviour.  ...  ABOUT SECURE COMICS Secure Comics is an educational three-part digital interactive comic series created by us. Figure 1 shows four individual screens.  ... 
doi:10.14236/ewic/hci2017.65 dblp:conf/bcshci/Zhang-KennedyBC17a fatcat:6pvbd5erp5ctpksnfa73viifbm

Information system security curricula development

Ed Crowley
2003 Proceeding of the 4th conference on Information technology education - CITC '03  
This paper also describes current Information System Security Training and Education dynamics.  ...  In this paper, we survey current literature concerning Information Systems Security Training and Education.  ...  The stated goal is to produce a document similar to the Joint IEEE Computer Society/ACM Task Force document "Model Curricula for Computing".  ... 
doi:10.1145/947121.947178 dblp:conf/sigite/Crowley03 fatcat:7swyetqu2rauxkv5ysvmafpw3a

A Model Curriculum for Security Aspects in IT Education
ENGLISH

Ashwani Kush, Sawtantar Singh
2005 DESIDOC Bulletin of Information Technology  
computers with virtual machines.  ...  General community expects solution from trained IT-professionals with respect to planning, configuration, implementation and maintenance of secure system for data transmission.  ...  The training curriculum for computer security course should include awareness, education, training and certification.  ... 
doi:10.14429/dbit.25.5.3667 fatcat:gqpsa5ck3jel7i2dpkwl3kwz3y

Computer Science Programs, Goals, Student Learning Outcomes and their Assessment [article]

Vijay Kanabar, Anatoly Temkin
2016 arXiv   pre-print
In this paper we describe the process used by MET Computer Science to identify programs, goals, and student learning outcomes for all our programs and graduate certificates.  ...  We illustrate how we started the process of assessing learning outcomes for our programs and present actual assessment results from the data collected for two programs that went through accreditation--  ...  Within this context we identified the program goals for all our degrees. See the program goal for the security concentration below. 1.  ... 
arXiv:1601.07793v1 fatcat:mawa7viwdfeqxhbpz3uva3itom

COMMUNITY COLLEGE CORNERUpdating the ACM associate-degree curricular guidance in computer science

Elizabeth K. Hawthorne
2016 ACM inroads  
A s a standing committee of the Association for Computing Machinery Education Board, the Committee for Computing Education in Community Colleges (ACM CCECC) has produced, through the decades, associate-degree  ...  outcomes in information assurance and security will serve as resources for the development of this new security-infused programming course intended for community colleges.  ... 
doi:10.1145/2884039 fatcat:g4hbu3hpxfb5bgnaei7jfadsvq

E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES

I&S Monitor
2004 Information & Security An International Journal  
The E-Gov Institute http://www.e-gov.com/ E-Gov is an accomplished organization of marketing and education professionals who have worked with technology leaders from government and industry for more than  ...  Founded in 1994, the IEG focuses on issues including public policy as it relates to technology strategy and execution, economic development and education, online citizen and business services, and e-democracy  ...  education in areas of information security that are crucial to the protection of critical computing and communication infrastructure.  ... 
doi:10.11610/isij.1508 fatcat:h7skds74xvcwvjs5dwfzm7yxfi

What is computer security?

M. Bishop
2003 IEEE Security and Privacy  
(on the job and in education) • Trends in employment • Tutorials of different aspects of security problems Our goal is to make computer security less mysterious and better understood.  ...  Requirements define security goals. They answer the question, "What do you expect security to do for you?" Policy defines the meaning of security.  ... 
doi:10.1109/msecp.2003.1176998 fatcat:w57vok2yebffrmzhx7mpragaym

Exploration and practice of curriculum ideological and Political Construction Reform ——Take "information security" course as an example

Pengyi Zheng, Xijuan Wang, Juanjuan Li, Jinchao Chen
2021 ASP Transactions on Computers  
According to the goal of " Curriculum ideological and politics", taking information security course as an example, focusing on the leading ideology facing the frontier of international scientific application  ...  the teaching cases in the information security course are excavated, and a set of Curriculum System Integrating Ideological and political and curriculum content is formed.  ...  Therefore, starting from the overall professional courses, considering the goal of ideological and political education for each course, the integration of ideological and political elements forms a part  ... 
doi:10.52810/tc.2021.100020 fatcat:zipsxhslrbdh7aj5ylnjw7kfpe

Joining the security education community

D. Frincke, M. Bishop
2004 IEEE Security and Privacy  
Workshop on Education in Computer Security Led by Cynthia Irvine of the computer and network security faculty at the Naval Postgraduate School in Monterey, California, the Workshop on Education in Computer  ...  Recent meeting discussions emphasize methods for achieving educational goals, and focus on growing centers of excellence in information assurance education.  ... 
doi:10.1109/msp.2004.75 fatcat:afo2fibryfa7bi4cgfe2d5nk7a

Secure Cloud Architecture based on YAK and ECC

Ankit KumarSingh, Saroj Kumar, Abhishek Rai
2014 International Journal of Computer Applications  
cloud architecture for enhancement of security measures General Terms  ...  In the present scenario security is biggest issue over internet cloud computing acronym is served everywhere in fast and growing computer generation.  ...  This paper focuses on security for education system including all security goals.  ... 
doi:10.5120/15831-4706 fatcat:bjwudjdgdbgx5hzpwgnct5673e
« Previous Showing results 1 — 15 out of 272,418 results