Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 2628, 2003, Monterey, California, USACynthia Irvine, Helen Armstrong Springer Science & Business Media, 2003. gada 31. maijs - 334 lappuses In ways both obvious and obscure, information technology is transforming our daily lives, yet the penetration of information technology into our critical infrastructures is still in its early stages. Security is an enabling technology. If these systems are built to be trusted, so that our privacy is maintained, so that transaction integrity can be relied upon, and so that resources are there when needed, then new paradigms for work and play will emerge. The challenge for educators is to create ways to ensure that those who must construct our enabling technology are equipped with the foundations and knowledge required doing the job. Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: -Curriculum design; |
Saturs
Cyber Security as an Emergent Infrastructure | 1 |
Teaching Network Security Through Live Exercises | 3 |
Information Warfare in the Trenches | 19 |
Changes in the Profile of Security Managers | 41 |
A Tutoring System for IT Security | 51 |
Design of a Laboratory for Information Security Education | 61 |
Integrating Information Security and Intelligence Courses | 75 |
Internet Security Management | 85 |
Teaching Undergraduate Information Assurance | 169 |
Teaching Undergraduate Information Assurance | 173 |
Teaching Undergraduate Information Assurance in Russia | 175 |
OutcomesBased Assessment as an Assurance Education Tool | 179 |
Evaluation Theory and Practice as Applied to Security Education | 197 |
Ten Years of Information Security Masters Programmes | 215 |
Network Security Scientific and Research Laboratory | 231 |
A Comprehensive Undergraduate Information Assurance program | 243 |
Information Security Fundamentals | 95 |
Australias Agenda for ESecurity Education and Research | 109 |
Is Security a Great Principle of Computing? | 115 |
IT Security Readiness in Developing Countries | 117 |
A Program for Education in Certification and Accreditation | 131 |
Mastering Computer Forensics | 151 |
Assembling Competitive Intelligence Using Classroom Scenarios | 159 |
Training the Cyber Warrior | 261 |
Security Education for Times of Netwar and Peace | 275 |
Improving Security Awareness Through ComputerBased Training | 287 |
Identification and Integration of Information Security Topics | 303 |
A Dedicated Undergraduate Track in Computer Security Education | 319 |
333 | |
Citi izdevumi - Skatīt visu
Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third ... Cynthia Irvine,Helen Armstrong Ierobežota priekšskatīšana - 2013 |
Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third ... Cynthia Irvine,Helen Armstrong Priekšskatījums nav pieejams - 2013 |
Security Education and Critical Infrastructures Cynthia Irvine,Helen Armstrong Priekšskatījums nav pieejams - 2014 |
Bieži izmantoti vārdi un frāzes
academic access control activities analysis application assessment assets attacks Australia Certification and Accreditation CIA triad competitive intelligence components computer forensic Computer Science Computer Security concepts configuration course Cryptography curriculum Cyber Defense Cyber tacticians cyber warriors database described DITSCAP E-security Edith Cowan University electronic commerce Engineering environment evaluation example exercise experience faculty Figure files firewall graduates hosts identify implementation information assurance Information Security Education Information Technology Information Warfare institutions integration Internet Security Management intrusion detection issues IWAR laboratory knowledge learning Linux materials military modules Network Security operating systems organisations organizations outcomes paper participants password Postgraduate problem protocols Red Team scenario security awareness security mechanisms server SIGSAC skills specific SSAA Tanzania teaching technical testing threats topics undergraduate units University virtual machines VMware vulnerabilities web server Workstation