Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
The challenges of designing lab exercises for a curriculum in computer security
Journal of Computing Sciences in Colleges
Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09
Design and Implementation of a Multi-Use Attack-Defend Computer Security Lab
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09
Training students to administer and defend computer networks and systems
Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
Georgia tech information security center hands-on network security laboratory
IEEE Transactions on Education
Hi-index | 0.00 |
Over the last few years, many universities and educational institutions have introduced computer security related courses to their degree programs. The majority of these courses feature intensive laboratory activity based on live experiments of attack and defense techniques by means of team games organized as "cyber-wars". In this paper we argue that, although it is a useful tool for teaching and learning these techniques, the exercise paradigm does not cover all the aspects of security relating to a real-world scenario, with it not allowing students to experience the realistic needs of maintaining network services. In this paper we present the "role-game of the Internet" which was designed as part of the lab activity of our Network Security Course. In our game, instead of fighting against each other, student-teams had to cooperate in order to accomplish a list of business-like tasks over a simulation of the Internet while preserving the security and availability of featured network services.