Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Information system security curricula development
CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
Using a virtual lab to teach an online information assurance program
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Information security labs in IDS/IPS for distance education
Proceedings of the 7th conference on Information technology education
The role of virtualization in computing education
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Blur the boundary between the virtual and the real
Journal of Computing Sciences in Colleges
Experiencing virtual computing lab in information technology education
Proceedings of the 10th ACM conference on SIG-information technology education
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Design exemplars for synchronous e-learning: A design theory approach
Computers & Education
Design exemplars for synchronous e-learning: A design theory approach
Computers & Education
Proceedings of the 2010 ACM conference on Information technology education
Feasibility of virtual security laboratory for three-tiered distance education
Proceedings of the 2010 ACM conference on Information technology education
Virtual Computing Laboratories Using VMware Lab Manager
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
Hi-index | 0.00 |
Online learning for educating information security professionals has increased in popularity. The security curriculum and technology, as well as hands-on laboratory experiences implemented in information security labs, are important elements in an online education system for information security. We drew our motivation from an on-going information security lab development initiative in our own institution, and this paper aims to provide an integrated overview on reported instances of online hands-on education in information security. Our review contributes to the existing knowledge by using the anatomy of design theory framework as a basis for literature analysis, as this provides a common basis to examine theories about human-created information technology artifacts such as information security labs and how such knowledge has been communicated to academia. Our results show that none of the articles studied here puts forward a well-grounded and tested design theory for on-line information security laboratories. This hinders accumulation of knowledge in this area and makes it difficult for others to observe, test and adapt clear design principles for security laboratories and exercises.