Open source, live CD based, security lab design: tutorial presentation
Journal of Computing Sciences in Colleges
Designing a trust chain for a thin client on a live Linux cd
Proceedings of the 2007 ACM symposium on Applied computing
V-NetLab: an approach for realizing logically isolated networks for security experiments
CSET'08 Proceedings of the conference on Cyber security experimentation and test
Wireless Malware Propagation: A Reality Check
IEEE Security and Privacy
Large Scale Delivery of Cisco Networking Academy Program by Blended Distance Learning
ICNS '10 Proceedings of the 2010 Sixth International Conference on Networking and Services
IT Professional
Design and implementation of a VLAN
ACC'10 Proceedings of the 2010 international conference on Applied computing conference
Intrusion detection system using honeypots and swarm intelligence
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
An overview of cyber attack and computer network operations simulation
Proceedings of the 2011 Military Modeling & Simulation Symposium
NICE: National Initiative for Cybersecurity Education
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
NSF investments in cybersecurity research and education
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
With the evolving challenges in cyberspace there is a need for curriculum development in cybersecurity. Students in a cybersecurity curriculum need to access and learn about topics in cybersecurity such that they have a clear understanding of the sophistication of threats such that they can implement mitigation response. Development of hands on curriculum in cybersecurity therefore poses significant challenges to the information technology infrastructure in an instructional environment. Among the various challenges one of the significant challenges involves attack simulations of a cyber-attack requiring the creation of a walled infrastructure to accommodate the equipment where computing services are hosted. The challenges of containing malicious software which can be released by accident are also significant to the IT infrastructure. In this paper we show how the walled infrastructure with computing service can be created such that cybersecurity curriculum can be institutionalized where students locally and remotely can access this infrastructure. The walled IT infrastructure is based on risk escalation wherein connectivity and access to computing resources is contained as risk to computing infrastructure increases. We also show IT challenges in curriculum development on topics of hardware, software and networking for cybersecurity and how virtualization is a means for solving the challenges in those respective topics.