Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USACynthia Irvine, Helen Armstrong Springer, 2013. gada 17. apr. - 334 lappuses In ways both obvious and obscure, information technology is transforming our daily lives, yet the penetration of information technology into our critical infrastructures is still in its early stages. Security is an enabling technology. If these systems are built to be trusted, so that our privacy is maintained, so that transaction integrity can be relied upon, and so that resources are there when needed, then new paradigms for work and play will emerge. The challenge for educators is to create ways to ensure that those who must construct our enabling technology are equipped with the foundations and knowledge required doing the job. Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: -Curriculum design; |
Saturs
Information Warfare in the Trenches | 19 |
Changes in the Profile of Security Managers 41 | 40 |
Design of a Laboratory for Information Security Education | 61 |
Integrating Information Security and Intelligence Courses 75 | 74 |
Information Security Fundamentals | 95 |
Australias Agenda for ESecurity Education and Research 109 | 108 |
A Program for Education in Certification and Accreditation | 131 |
Mastering Computer Forensics 151 | 150 |
Evaluation Theory and Practice as Applied to Security Education | 197 |
Ten Years of Information Security Masters Programmes | 215 |
Network Security Scientific and Research Laboratory | 231 |
Training the Cyber Warrior | 261 |
Security Education for Times of Netwar and Peace | 275 |
Identification and Integration of Information Security Topics 303 | 302 |
A Dedicated Undergraduate Track in Computer Security Education | 319 |
333 | |
Citi izdevumi - Skatīt visu
Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third ... Cynthia Irvine,Helen Armstrong Ierobežota priekšskatīšana - 2003 |
Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third ... Cynthia Irvine,Helen Armstrong Priekšskatījums nav pieejams - 2013 |
Security Education and Critical Infrastructures Cynthia Irvine,Helen Armstrong Priekšskatījums nav pieejams - 2014 |
Bieži izmantoti vārdi un frāzes
academic access control activities analysis application assessment assets attacks Australia Certification and Accreditation CIA triad components computer forensic Computer Science Computer Security concepts configuration course Cryptography curriculum Cyber tacticians cyber warriors CyberDefense database Defense described DITSCAP E-security Edith Cowan University electronic Engineering environment evaluation example exercise experience faculty Figure files firewall graduates hosts identify implementation information assurance information security information security education Information Technology Information Warfare institutions integration Internet Security Management intrusion detection issues IWAR laboratory knowledge learning Linux materials military modules network security operating systems organisations organizations outcomes paper participants password Postgraduate problem protocols questions Red Team scenario security awareness security mechanisms server SIGSAC skills specific SSAA Tanzania teaching technical threats topics undergraduate units University virtual machines VMware vulnerabilities web server Workstation