enter search term and/or author name
Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1
B. Popovsky, S. Oudekirk, D. Frincke
Article No.: 1
This editorial introduces a set of articles in the JERIC special issue on resources for the computer security and information assurance curriculum. It begins with a discussion of why such a special edition is needed and continues by outlining the...
Innovative model for information assurance curriculum: A teaching hospital
Laura Iwan, Adnan Baykal, Damira Pon, Jon Hobbs, Robert Bangert-Drowns, Sandoor P. Schuman, Thomas Hurbanek, Vince Delio, Peter Bloniarz, Sanjay Goel, George Berg, Jagdish Gangolly
Article No.: 2
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training....
This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer...
Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers
Jesús Adolfo García-Pasquel, José Galaviz
Article No.: 4
Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzúa (picklock in Spanish) is an application...
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix,...
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of...