Security auditing course development

  • Authors:
  • Yin Pan

  • Affiliations:
  • Rochester Institute of Technology, Rochester, New York

  • Venue:
  • Proceedings of the 8th ACM SIGITE conference on Information technology education
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures and controls in identifying and managing risks associated with networks and various operating systems. This has raised the need to develop specialists in the cyber security auditing field. This paper presents the author's experience in developing an undergraduate course on security auditing. It discusses the course design, procedures, and a series of innovative laboratory projects that are aimed to simulate real-world security concerns. This course is one of the core courses of the newly established B. S. in security program in the Department of Network, Security, and Systems Administration at RIT. This paper also reports experiences learned by both the students and instructors when the course was first offered. The course was well received by students, albeit there are areas for improvement.