skip to main content
research-article

An information assurance curriculum for commanding officers using hands-on experiments

Published:04 March 2009Publication History
Skip Abstract Section

Abstract

To authorize and initiate necessary investments and enforce appropriate policies and procedures, decision-makers need to have at least a fair understanding of computer security fundamentals. This paper presents the course design and the laboratory settings that have been developed for, and used within, the high rank officer curriculum at the Swedish National Defence College. The developed course looks at computer security from an attack versus defend viewpoint, meaning that computer attacks are studied to learn about prevention and self-defense. The paper discusses the pedagogical challenges related to education of high rank officers and similar personnel in light of recently-held courses and contrasts the course relative to similar undertakings. A standpoint taken is that computer security is best taught using hands-on laboratory experiments focusing on problem solving assignments. This is not undisputed since, e.g., high rank officers are busy people who are not fond of getting stuck learning about the peripherals.

References

  1. L. Armistead, editor. Information Operations: Warfare and the Hard Reality of Soft Power. Issues in Twenty-First Century Warfare. Brassey's, Inc., Washington, District of Columbia, 2004.Google ScholarGoogle Scholar
  2. M. Bishop. Computer security education: Training, scholarship, and research. IEEE Computer, 35(4):30--32, Apr. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Cohen, L. Manion, and K. Morrison. Research Methods in Education, chapter 14, pages 297--313. Routledge, London, sixth edition, 2007.Google ScholarGoogle Scholar
  4. E. Crowley. Information system security curricula development. In Proceedings of the Fourth ACM SIGITE Conference on Information Technology Curriculum, pages 249--255, Lafayette, Indiana, Oct. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. W. Gardner. Educating for understanding. The American School Board Journal, 180(7):20--24, July 1993.Google ScholarGoogle Scholar
  6. J. Hill, C. Carver, J. Humphries, and U. Pooch. Using an isolated network laboratory to teach advanced networks and security. In Proceedings of the 32nd ACM SIGCSE Technical Symposium on Computer Science Education, pages 36--40, Charlotte, North Carolina, Feb. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. E. Irvine, S.-K. Chin, and D. Frincke. Integrating security into the curriculum. IEEE Computer, 31(12):25--30, Dec. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Jacobson. Teaching information warfare with lab experiments via the Internet. In Proceedings of the 34th ASEE/IEEE Frontiers in Education Conference, pages T3C/7-12, Savannah, Georgia, Oct. 2004.Google ScholarGoogle ScholarCross RefCross Ref
  9. B. E. Mullins, T. H. Lacey, R. F. Mills, J. M. Trechter, and S. D. Bass. How the cyber defense exercise shaped an information-assurance curriculum. IEEE Security & Privacy, 5(5):40-49, Sept.-Oct. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. W. Romney, C. Higby, B. R. Stevenson, and N. Blackham. A teaching prototype for educating IT security engineers in emerging environments. In Proceedings of the Fifth IEEE International Conference on Information Technology Based Higher Education and Training, pages 662--667, Istanbul, Turkey, May-June 2004.Google ScholarGoogle ScholarCross RefCross Ref
  11. L. S. Schadler and J. B. Hudson. The emergence of studio courses-an example of interactive learning. In C. Baillie and I. Moore, editors, Effective Learning and Teaching in Engineering, chapter 10, pages 156--168. RoutledgeFalmer, New York, 2004.Google ScholarGoogle Scholar
  12. S. K. Sharma and J. Sefchek. Teaching information systems security courses: A hands-on approach. Computers & Security, 26(4):290--299, June 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. S. Swart and R. F. Erbacher. Educating students to create trustworthy systems. IEEE Security & Privacy, 5(3):58--61, May-June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Wilson, D. E. de Zafra, S. I. Pitcher, J. D. Tressler, and J. B. Ippolito. Information Technology Security Training Requirements: A Role- and Performance-Based Model. NIST Special Publication 800--16, National Institute of Standards and Technology, U.S. Department of Commerce, Apr. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An information assurance curriculum for commanding officers using hands-on experiments

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM SIGCSE Bulletin
                ACM SIGCSE Bulletin  Volume 41, Issue 1
                SIGCSE '09
                March 2009
                553 pages
                ISSN:0097-8418
                DOI:10.1145/1539024
                Issue’s Table of Contents
                • cover image ACM Conferences
                  SIGCSE '09: Proceedings of the 40th ACM technical symposium on Computer science education
                  March 2009
                  612 pages
                  ISBN:9781605581835
                  DOI:10.1145/1508865

                Copyright © 2009 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 4 March 2009

                Check for updates

                Qualifiers

                • research-article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader