Hacking Exposed
Security in Computing
A security model for distributed computing
Journal of Computing Sciences in Colleges
Journal of Computing Sciences in Colleges
netWorker - Trekking ahead: trends for 2005
Design of a distributed computer security lab
Journal of Computing Sciences in Colleges
Teaching and learning ethics in computer science: walking the walk
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Integrating security across the computer science curriculum
Journal of Computing Sciences in Colleges
Network Security Essentials
Hi-index | 0.00 |
This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.