Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
A real-time information warfare exercise on a virtual network
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Teaching students to hack: curriculum issues in information security
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Maintaining ethical standards for a computer security curriculum
Proceedings of the 1st annual conference on Information security curriculum development
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Experiences in cyber security education: the MIT Lincoln laboratory capture-the-flag exercise
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
A method for incorporating usable security into computer security courses
Proceeding of the 44th ACM technical symposium on Computer science education
Hi-index | 0.00 |
In spite of the controversy surrounding the practice of using offensive computer security exercises in information assurance curricula, it holds significant educational value. An exercise and architecture for an asymmetric (offense-only) security project, nicknamed "Blunderdome", has been deployed twice at the University of Tulsa: once to graduate students in a security engineering course, and once to high school students as part of a research internship program. This paper discusses the framework, the project, its educational value, and lessons learned for future deployments. Coverage is also given briefly to a summary of our position on the role of offensive exercises in security education.