2015 International Conference on Cloud and Autonomic Computing 2015
DOI: 10.1109/iccac.2015.47
|View full text |Cite
|
Sign up to set email alerts
|

Teaching and Training Cybersecurity as a Cloud Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 1 publication
0
12
0
2
Order By: Relevance
“…For example, Salah et al [30] propose the use of a virtual classroom system based on Amazon Web Services for teaching cybersecurity, while other authors propose the use of an off-campus network laboratory with low-cost platforms as lightweight honeypots [31]. Similarly, Tunc et al [32] suggest easing cybersecurity experiments by providing online tools through a concept that the authors call Cybersecurity Lab as a Service (CLaaS).…”
Section: Iiot and Industry 40 Cybersecurity Teachingmentioning
confidence: 99%
“…For example, Salah et al [30] propose the use of a virtual classroom system based on Amazon Web Services for teaching cybersecurity, while other authors propose the use of an off-campus network laboratory with low-cost platforms as lightweight honeypots [31]. Similarly, Tunc et al [32] suggest easing cybersecurity experiments by providing online tools through a concept that the authors call Cybersecurity Lab as a Service (CLaaS).…”
Section: Iiot and Industry 40 Cybersecurity Teachingmentioning
confidence: 99%
“…The authors use the Amazon Web Services (AWS) cloud and remark as its main advantage that students perform the exercises in a contained and secure environment without having to deal with cumbersome tasks to set up and configure cybersecurity tools. A similar approach is detailed in [21], where the concept of Cybersecurity Lab as a Service (CLaaS) is proposed to provide cybersecurity experiments to students that can be anywhere and that only need an Internet connection and a device like a laptop, tablet, or a smartphone to carry out the required tasks of the course.…”
Section: Cybersecurity Teaching and Learningmentioning
confidence: 99%
“…Only a few remote labs can be found to allow remote experimentation. An example is the work of Tunc et al [ 41 ], who presented an IoT remote laboratory designed only for cybersecurity experimentation.…”
Section: State Of the Artmentioning
confidence: 99%
“…The run-time environment can be “packaged” using already known virtualization technologies [ 41 ], such as Docker [ 48 , 49 ]. Docker is based on the use of containers that define a prefabricated execution environment.…”
Section: Solution Descriptionmentioning
confidence: 99%