In Athena's Camp
Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates
SIGCSE '02 Proceedings of the 33rd SIGCSE technical symposium on Computer science education
Information warfare in the trenches
Security education and critical infrastructures
A real-time information warfare exercise on a virtual network
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Technology Education at the US Military Academy
IEEE Security and Privacy
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Meeting the criteria for a Center of Academic Excellence (CAE) in information assurance education
Journal of Computing Sciences in Colleges
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
Building a network testbed for internet security research
Journal of Computing Sciences in Colleges
Two approaches to an information security laboratory
Communications of the ACM - Surviving the data deluge
Using visualization to teach security
Journal of Computing Sciences in Colleges
Hi-index | 0.00 |
This paper describes a unique resource at West Point, the Information Analysis and Research Laboratory, referred to as the IWAR range. The IWAR range is an isolated laboratory used by undergraduate students and faculty researchers. The IWAR is a production-system-like, heterogeneous environment. The IWAR has become a vital part of the Information Assurance curriculum at West Point. We use the military range analogy to teach the students in the class that the exploits and other tools used in the laboratory are weapons and should be treated with the same care as rifles and grenades. This paper describes the structure of the laboratory and how it is used in classroom instruction. It also describes the process used to create the IWAR and how an IWAR might be built using limited resources. Finally, this paper describes the future directions of the IWAR project.