Abstract. There is a tendency in information security education at universities to not only teach protection measures but also attack tech-niques. Increasingly more universities offer hands-on labs, where students can experience both the attackers ’ and the administrators ’ view. Getting to know the attackers ’ view is thought to lead to a better understand-ing of information security and its problems compared to teaching only strategies for defense. This paper analyzes the situation of information security education at German and international universities. We present a method to measure knowledge in information security and – using this method in an em-pirical study – evaluate the offensive teaching approach. Analysis of the empirical dat...
This paper examines an approach to developing an Information Security course based on the expansion ...
In recent years, a dramatic shift has occurred in the way computers are used. The advances in comput...
[[abstract]]Information security cognition requires mutual confirmation from factual knowledge and p...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
Abstract: Information system security teaching is very complex because of the wide range of domains ...
Information security management is an area with a lot of theoretical models. The models are designed...
We describe innovative new approaches to teaching information systems security that may be used indi...
This paper deals with education in security issues. The aim of this work is to examine and evaluate ...
Existing textbooks and training materials in basic information security do not reflect the actual pr...
Cybersecurity attacks continue to increase. This is particularly true for attacks based on soc...
Increasingly the realm of Information Operations (IO) and Cyber Warfare are seen as crucial to the s...
In the era of information, it has become vital for companies to make sure that their information is ...
When the power of computing and communications technology was unleashed for the benefit of the socie...
The purpose of this study is to identify the knowledge of CEIT student teachers on the information s...
The growing importance of information security as a business issue has encouraged instructors to ext...
This paper examines an approach to developing an Information Security course based on the expansion ...
In recent years, a dramatic shift has occurred in the way computers are used. The advances in comput...
[[abstract]]Information security cognition requires mutual confirmation from factual knowledge and p...
The threat of universities being attacked by hackers has increased steadily in recent years. Since u...
Abstract: Information system security teaching is very complex because of the wide range of domains ...
Information security management is an area with a lot of theoretical models. The models are designed...
We describe innovative new approaches to teaching information systems security that may be used indi...
This paper deals with education in security issues. The aim of this work is to examine and evaluate ...
Existing textbooks and training materials in basic information security do not reflect the actual pr...
Cybersecurity attacks continue to increase. This is particularly true for attacks based on soc...
Increasingly the realm of Information Operations (IO) and Cyber Warfare are seen as crucial to the s...
In the era of information, it has become vital for companies to make sure that their information is ...
When the power of computing and communications technology was unleashed for the benefit of the socie...
The purpose of this study is to identify the knowledge of CEIT student teachers on the information s...
The growing importance of information security as a business issue has encouraged instructors to ext...
This paper examines an approach to developing an Information Security course based on the expansion ...
In recent years, a dramatic shift has occurred in the way computers are used. The advances in comput...
[[abstract]]Information security cognition requires mutual confirmation from factual knowledge and p...