We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an attack by the instructor. Students then learn how to use open-source defense tools appropriate for the role they are playing and the attack at hand. Threats covered include eavesdropping, dictionary, man-in-the-middle, port-scanning, and fingerprinting attacks. Defense skills gained by students include how to forward ports with OpenSSH, how to prevent weak passwords with CrackLib, how to salt passwor...
With the advancement in technology over the past decades, networks have become increasingly large an...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
The Security Protocol Game is a highly interactive game for teaching secure data communications prot...
With the rapid development of computer science and technology, network attack and defense has become...
We describe our experience with teaching computer security labs at two different universities. We re...
Abstract: Computer and network security have become concerns for enterprises ranging from sole propr...
Teaching Network Security course is a challenging task. One of the challenges is that networks have ...
Abstract- To develop a lab module tool that allows the extension and parameterization of a security ...
This paper presents an intrusion experiment in which the target system was a Personal Computer netwo...
The objective of this thesis was to explore the different types of cyber-attack, phases of an attack...
This paper introduces the running prototype of a novel open source e-learning environment for networ...
In a world where security agencies recruit their security experts, a fundamental and affordable educ...
American philosopher John Dewey, in one of his most famous theories about the hands-on approach to l...
© 2017 IEEE. Hands-on ethical hacking and network defense has become an essential component in teach...
Abstract- Computer network security is a new and fast moving technology in the field of computer sci...
With the advancement in technology over the past decades, networks have become increasingly large an...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
The Security Protocol Game is a highly interactive game for teaching secure data communications prot...
With the rapid development of computer science and technology, network attack and defense has become...
We describe our experience with teaching computer security labs at two different universities. We re...
Abstract: Computer and network security have become concerns for enterprises ranging from sole propr...
Teaching Network Security course is a challenging task. One of the challenges is that networks have ...
Abstract- To develop a lab module tool that allows the extension and parameterization of a security ...
This paper presents an intrusion experiment in which the target system was a Personal Computer netwo...
The objective of this thesis was to explore the different types of cyber-attack, phases of an attack...
This paper introduces the running prototype of a novel open source e-learning environment for networ...
In a world where security agencies recruit their security experts, a fundamental and affordable educ...
American philosopher John Dewey, in one of his most famous theories about the hands-on approach to l...
© 2017 IEEE. Hands-on ethical hacking and network defense has become an essential component in teach...
Abstract- Computer network security is a new and fast moving technology in the field of computer sci...
With the advancement in technology over the past decades, networks have become increasingly large an...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
The Security Protocol Game is a highly interactive game for teaching secure data communications prot...