|
![]() |
|||
|
||||
OverviewIn ways both obvious and obscure, information technology is transforming our daily lives, yet the penetration of information technology into our critical infrastructures is still in its early stages. Security is an enabling technology. If these systems are built to be trusted, so that our privacy is maintained, so that transaction integrity can be relied upon, and so that resources are there when needed, then new paradigms for work and play will emerge. The challenge for educators is to create ways to ensure that those who must construct our enabling technology are equipped with the foundations and knowledge required doing the job. This book presents developments in research and practice on teaching information security, and covers topics including: curriculum design; laboratory systems and exercises; security education programme assessment; distance learning and web-based teaching of security; teaching computer forensics; laboratory-based system defence games; security education tools; and education in security policies, management and system certification. The book includes case studies throughout. The volume contains the papers selected for presentation at the third World Conference on Information Security Education (WISE3). The conference and workshops were sponsored by the International Federation for Information Processing (IFIP), organized by IFIP Working Group 11.8, and held in Monterey, California, USA in June 2003. Full Product DetailsAuthor: Cynthia Irvine , Helen ArmstrongPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2003 ed. Volume: 125 Dimensions: Width: 15.50cm , Height: 2.00cm , Length: 23.50cm Weight: 1.490kg ISBN: 9781402074783ISBN 10: 1402074786 Pages: 334 Publication Date: 31 May 2003 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsContributing Authors. Preface. Acknowledgments. Cyber Security as an Emergent Infrastructure; D.E. Denning. Teaching Network Security Through Live Exercises; G. Vigna. Information Warfare in the Trenches; S.D. Lathrop, G.J. Conti, D.J. Ragsdale. Changes in the Profile of Security Managers; T. Virtanen. A Tutoring System for IT Security; Ji Hu, M. Schmitt, C. Willems, C. Meinel. Design of a Laboratory for Information Security Education; V. Anantapadmanabhan, P. Frankl, N. Memon, G. Naumovich. Integrating Information Security and Intelligence Courses; W. Hutchinson. Internet Security Management; H.L. Armstrong. Information Security Fundamentals; P. Oscarson. Australia's Agenda for E-Security Education and Research; M.J. Warren. Is Security a Great Principle of Computing? P.J. Denning. IT Security Readiness in Developing Countries; R. Casmir, L. Yngström. A Program for Education in Certification and Accreditation; C.W. Rasmussen, C.E. Irvine, G.W. Dinolt, T.E. Levin, K.L. Burke. Mastering Computer Forensics; C.J. Armstrong. Assembling Competitive Intelligence Using Classroom Scenarios; H.L. Armstrong, J. Davey. Panel: Teaching Undergraduate Information Assurance; M. Bishop. Panel: Teaching Undergraduate Information Assurance; R. Vaughn. Panel: Teaching Undergraduate Information Assurance in Russia; A. Maljuk, N. Miloslavskaia, A. Tolstoi. Outcomes-based Assessment as an Assurance Education Tool; S. Older, Shiu-Kai Chin. Evaluation Theory and Practice as Applied to Security Education; M.J. Dark. Ten Years of Information Security Masters Programmes; C. Ciechanowicz, K.M. Martin, F.C. Piper, M.J.B. Robshaw. Network Security Scientific and Research Laboratory; N. Miloslavskaia, A. Tolstoi. A Comprehensive Undergraduate InformationAssurance Program; G. Conti, J. Hill, S. Lathrop, K. Alford, D. Ragsdale. Training the Cyber Warrior; J.D. Fulp. Security Education for Times of Netwar and Peace; J. Dockal. Improving Security Awareness Through Computer-based Training; S.M. Furnell, A.G. Warren, P.S. Dowland. Identification and Integration of Information Security Topics; J. Brown. A Dedicated Undergraduate Track in Computer Security Education; S. Azadegan, M. Lavine, M. O'Leary, A. Wijesinha, M. Zimand. Index of Keywords.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |