Proceedings of the 40th ACM Technical Symposium on Computer Science Education 2009
DOI: 10.1145/1508865.1508953
|View full text |Cite
|
Sign up to set email alerts
|

An information assurance curriculum for commanding officers using hands-on experiments

Abstract: To authorize and initiate necessary investments and enforce appropriate policies and procedures, decision-makers need to have at least a fair understanding of computer security fundamentals. This paper presents the course design and the laboratory settings that have been developed for, and used within, the high rank officer curriculum at the Swedish National Defence College. The developed course looks at computer security from an attack versus defend viewpoint, meaning that computer attacks are studied to lear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…Instead, existing data sources such as taxonomies, profiling and knowledge elicitation workshops about the targeted group of users can act as an alternative. Considering IT security from an attack versus defend view-point is a common way to study threats [16], [17], and can provide insightful information about the attackers such as how they carry out attacks, which weaknesses they target the most, the skill of the attacker in terms of the way an attack is carried out, etc. Such data concerning different categories of attackers can be acquired from IT security professionals using quantitative and/or qualitative means.…”
Section: A Assumption and Attacker Personasmentioning
confidence: 99%
“…Instead, existing data sources such as taxonomies, profiling and knowledge elicitation workshops about the targeted group of users can act as an alternative. Considering IT security from an attack versus defend view-point is a common way to study threats [16], [17], and can provide insightful information about the attackers such as how they carry out attacks, which weaknesses they target the most, the skill of the attacker in terms of the way an attack is carried out, etc. Such data concerning different categories of attackers can be acquired from IT security professionals using quantitative and/or qualitative means.…”
Section: A Assumption and Attacker Personasmentioning
confidence: 99%
“…Most computer security instructors use the methods of defense assurance and attack understanding [7]. The learning process can be improved by using a mixture of theory and concepts [8]. Louthan et.…”
Section: Security Coursesmentioning
confidence: 99%
“…Consequently, there is a need for a framework to be used for enlightening the user/defender about the attacker perspective (Brynielsson 2009), and enable them to specify security-centric requirements in their context of use. However, in order to do this one must have some representation of the threats and the actual actors who might pose the threat.…”
Section: Introductionmentioning
confidence: 99%