The challenges of designing lab exercises for a curriculum in computer security

  • Authors:
  • Rahul Tikekar;Thomas Bacon

  • Affiliations:
  • Department of Computer Science, Southern Oregon University, Ashland, OR;Department of Computer Science, Southern Oregon University, Ashland, OR

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2003

Quantified Score

Hi-index 0.01

Visualization

Abstract

Increasing awareness of the vulnerabilities of computer systems has led to the introduction of several programs in computer security. Most of these programs are meant to attract graduate students. Southern Oregon University has recently started a new undergraduate track in computer security and information assurance. In this paper we describe the development of lab exercises geared toward such a curriculum. The process begins with the curriculum itself and the lab - designing one that mirrors an actual enterprise and allows machines to be "attacked" while protecting the campus and external networks. The next step is designing assignments that model real-world situations like finding vulnerabilities in a system and using them to gain access to the system. The final step is designing larger exercises or projects that can be undertaken at the capstone level or at the graduate level. The paper describes ongoing efforts as well as future plans for such exercises.