skip to main content
research-article
Free access

Two approaches to an information security laboratory

Published: 01 December 2008 Publication History
First page of PDF

References

[1]
Denning, P. J., Comer, D., Gries, D., Mulder, M. C., Tucker A. B., Turner, A. J., and Young, P. R. Computing as a discipline. Comm. of the ACM, 32,1, (1989), 9--23.
[2]
Hill, J. M. D., Carver Jr., A. C, Humphries, J. W., and Pooch, U. W. Using an isolated network laboratory to teach advanced networks and security. Proceedings of the 32nd SIGCSE technical symposium on computer science education, 2001, 36--40.
[3]
Micco, M., and Rossman, H. Building a Cyberwar Lab. Lessons Learned Teaching Cybersecurity Principles to Undergraduates. Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education 2002, 23--27.
[4]
Ragsdale, D., Welch, D., and Dodge, R. Information Assurance the West Point Way. IEEE Security & Privacy, vol. 1, no. 5, 2003, 64--67.
[5]
Schäfer, J., Ragsdale, D. J., Surdu, J. R., and Carver, C. A. The IWAR range: a laboratory for undergraduate information assurance education. Proceedings of the 6th annual CCSC northeastern conference on computing in small colleges, 2001, 223--232.
[6]
Tucker, A. B. Computing curricula 1991. Comm. of the ACM, 34, 6, (1991), 68--84.
[7]
Welch, D., Ragsdale, D., and Schepens, W. Training for information assurance. Computer, 35, 4, (2002), 30--37

Cited By

View all
  • (2013)An Interdisciplinary Approach to Educating an Effective Cyber Security WorkforceProceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference10.1145/2528908.2528923(71-78)Online publication date: 12-Oct-2013
  • (2012)Disturbed playingProceedings of the 5th USENIX conference on Cyber Security Experimentation and Test10.5555/2372336.2372351(11-11)Online publication date: 6-Aug-2012
  • (2010)Evaluation of the Offensive Approach in Information Security EducationSecurity and Privacy – Silver Linings in the Cloud10.1007/978-3-642-15257-3_18(203-214)Online publication date: 2010

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 51, Issue 12
Surviving the data deluge
December 2008
126 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1409360
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2008
Published in CACM Volume 51, Issue 12

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)227
  • Downloads (Last 6 weeks)32
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)An Interdisciplinary Approach to Educating an Effective Cyber Security WorkforceProceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference10.1145/2528908.2528923(71-78)Online publication date: 12-Oct-2013
  • (2012)Disturbed playingProceedings of the 5th USENIX conference on Cyber Security Experimentation and Test10.5555/2372336.2372351(11-11)Online publication date: 6-Aug-2012
  • (2010)Evaluation of the Offensive Approach in Information Security EducationSecurity and Privacy – Silver Linings in the Cloud10.1007/978-3-642-15257-3_18(203-214)Online publication date: 2010

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media