skip to main content
10.1145/1940941.1940949acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Security education on a budget: getting the most "bang for the buck" with limited time and resources

Published:01 October 2010Publication History

ABSTRACT

Recently, general understanding of the importance of system security has increased and has been reflected in undergraduate and graduate curricula that offer security courses. These security education components are certainly a step in the right direction and should contribute to increased attention to security during the design and development phases of software and system engineering. However, the importance of system security is not always reflected in the quantity of required security courses or the budget allocated for such courses. One way for getting the most "bang for the buck" when it comes to security education is to have a small set of concentrated security courses that pair hands-on labs and lasting security principles; then, augment these security courses with additional security components and activities in other required courses from the curriculum. To provide education that is both relevant now and in the future, we use a principles-based approach together with hands-on security labs. We offer seven strategies for making this approach successful. Based on direct observation, student surveys, anecdotal evidence, and job placement, we believe that this approach has been successful in producing graduates both conscious of security issues and capable of designing and developing secure systems.

References

  1. Anzai, Y., and Simon, H. A. 1979. The theory of learning by doing. Psychological Review, 86, (2), 124--140.Google ScholarGoogle Scholar
  2. Criteria for accrediting computing programs. 2009. ABET Website. http://www.abet.org/forms.shtmlGoogle ScholarGoogle Scholar
  3. Foundstone Free Tools. http://www.foundstone.com/us/resources-free-tools.aspGoogle ScholarGoogle Scholar
  4. Fraud and related activity in connection with computers. 2009. Title 18 U.S.C§ 1030.Google ScholarGoogle Scholar
  5. Graves, K. 2007. CEH: Official Certified Ethical Hacker Review Guide: Exam 312--50. Sybex. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. R. 3482--107th Congress: Cyber Security Enhancement Act of 2002. 2001. In GovTrack.us (database of federal legislation). http://www.govtrack.us/congress/bill.xpd?bill=h107-3482Google ScholarGoogle Scholar
  7. Long, J. 2007. Google hacking for penetration testers, 1st ed. Syngress. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. OWASP Top Ten Web Application Security Risks. 2010. Open Web Application Security Project. http://www.owasp.org/index.php/Category:OWASP_Top_Ten_ProjectGoogle ScholarGoogle Scholar
  9. Pfleeger, S. & Pfleeger, C. 2006. Security in Computing. US: Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pirolli, P. L. and Anderson, J. R. 1985. The role of learning from examples in the acquisition of recursive programming skills, Canadian Journal of Psychology, 39, (2), 240--272, (June 1985).Google ScholarGoogle ScholarCross RefCross Ref
  11. Wiggins, G. P. 1993. Assessing student performance. San Francisco: Jossey-Bass Publishers.Google ScholarGoogle Scholar
  12. Wiggins, G., and McTighe, J. 1998. Understanding by design. Alexandria, VA: Association for Supervision and Curriculum Development.Google ScholarGoogle Scholar

Index Terms

  1. Security education on a budget: getting the most "bang for the buck" with limited time and resources

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                InfoSecCD '10: 2010 Information Security Curriculum Development Conference
                October 2010
                187 pages
                ISBN:9781450302029
                DOI:10.1145/1940941

                Copyright © 2010 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 October 2010

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate18of23submissions,78%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader