Design of a Laboratory for Information Security Education
نویسندگان
چکیده
It has been recognized for some time now that education in information security is better served by a laboratory component that reinforces principle and theoretical analysis learnt in the class room with a followup hands-on component performed in an appropriate laboratory. In this paper we present the design of a highly reconfigurable laboratory for information security education. The design has been implemented successfully in ISIS The Information Systems and Internet Security Laboratory at Polytechnic University. We also describe the rationale for our design and give examples of a few typical assignments that the laboratory facilitates.
منابع مشابه
On the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملGoals, Models, and Progress towards Establishing a Virtual Information Security Laboratory in Maine
Information security education remains a critical topic in today’s information driven societies. Educational institutions have been called to action to help raise information security awareness, knowledge and skills in those they serve. Cyber defense competitions are an attractive option to help raise awareness and interest in information security. Effective information security educational act...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملLaboratory Design For Demonstrating Phishing
Hands-on laboratory exercises are a very important component of computer security and information assurance education. This paper reports the laboratory exercises we designed to demonstrate two ways of conducting phishing attack: 1) Embedding a hyperlink in a fake email which redirects the victim to a fake website; 2) Using ARP cache poisoning to redirect web access to a fake website. The two w...
متن کاملDeveloping an Academic Security Laboratory
Information Security college-level education efforts received a financial shot in the arm late last year with the announcement of a federal funding program to train an information security workforce. In this paper, we address issues surrounding development of a viable Computer Science, Information Security laboratory that meets the three-pronged needs of research education, and outreach in a re...
متن کامل