Practical and Experimental Approaches to Information Security Education

作者: Naomi Falby , Cynthia Irvine , Matthew Rose

DOI:

关键词: Data scienceTrack (rail transport)Management scienceInformation securityComputer science

摘要: We describe our experiences from the first three years we have offered track in computer security for science major. present details of track, including descriptions courses offered. discuss lessons learned offering as well challenges

参考文章(47)
Audrey J. Dorofee, Carol C. Woody, James F. Stevens, Cecilia Albert, OCTAVE-S Implementation Guide, Version 1 ,(2005)
Felix Freiling, Maximillian Dornseif, Martin Mink, Lexi Pimenidis, Teaching Data Security at University Degree Level Moscow Engineering Physics Inst.. ,(2005)
Mary Ann Davidson, Leading by Example: The Case for IT Security in Academia. Educational Review. ,vol. 40, ,(2005)
Stefan Lindskog, Ulf Lindqvist, Erland Jonsson, IT Security Research and Education in Synergy Proceedings of the First World Conference on Information Security Education (WISE'1). ,(1999)
Curt M. White, Visualization tools to support data communications and computer network courses Journal of Computing Sciences in Colleges. ,vol. 17, pp. 81- 89 ,(2001) , 10.5555/772488.772503
Linda Null, Integrating security across the computer science curriculum Journal of Computing Sciences in Colleges. ,vol. 19, pp. 170- 178 ,(2004)
S. Azadegan, M. Lavine, M. O’Leary, A. Wijesinha, M. Zimand, A dedicated undergraduate track in computer security education Security education and critical infrastructures. pp. 319- 331 ,(2003) , 10.1007/978-0-387-35694-5_28
Laurie Werner, Teaching principled and practical information security Journal of Computing Sciences in Colleges. ,vol. 20, pp. 81- 89 ,(2004)
Morris Liaw, T. Andrew Yang, Swati Achar, Kwok-Bun Yue, George Collins, Jayaraman T. Venkatraman, Ping Chen, Karthik Sadasivam, Design of a distributed computer security lab Journal of Computing Sciences in Colleges. ,vol. 20, pp. 332- 346 ,(2004) , 10.5555/1040231.1040274