Computing Education (TOCE)


Search Issue
enter search term and/or author name


Journal on Educational Resources in Computing (JERIC), Volume 6 Issue 3, September 2006

Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1
B. Popovsky, S. Oudekirk, D. Frincke
Article No.: 1
DOI: 10.1145/1243481.1243482

This editorial introduces a set of articles in the JERIC special issue on resources for the computer security and information assurance curriculum. It begins with a discussion of why such a special edition is needed and continues by outlining the...

Innovative model for information assurance curriculum: A teaching hospital
Laura Iwan, Adnan Baykal, Damira Pon, Jon Hobbs, Robert Bangert-Drowns, Sandoor P. Schuman, Thomas Hurbanek, Vince Delio, Peter Bloniarz, Sanjay Goel, George Berg, Jagdish Gangolly
Article No.: 2
DOI: 10.1145/1243481.1243483

A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training....

Teaching context in information security
Matt Bishop
Article No.: 3
DOI: 10.1145/1243481.1243484

This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer...

Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers
Jesús Adolfo García-Pasquel, José Galaviz
Article No.: 4
DOI: 10.1145/1243481.1243485

Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzúa (picklock in Spanish) is an application...

Teaching hands-on Linux host computer security
Rose Shumba
Article No.: 5
DOI: 10.1145/1243481.1243486

In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix,...

A term project for a course on computer forensics
Warren Harrison
Article No.: 6
DOI: 10.1145/1243481.1243487

The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of...