enter search term and/or author name
Editorial: Resources for the computer security and information assurance curriculum
B. Popovsky, S. Oudekirk, D. Frincke
Article No.: 1
This editorial introduces the articles in this companion issue to the first JERIC special issue on Computer Security and Information Assurance Curriculum. It includes an article that supports making computer security education more accessible...
Taking the network on the road: Portable network solutions for computer security educators
Timothy Rosenberg, Lance J. Hoffman
Article No.: 2
Educational institutions that wish to implement a specialized teaching laboratory often have a variety of obstacles to overcome. Some of these obstacles are related to adapting existing classroom infrastructure, building the laboratory, and...
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education...
Laboratory exercises in online information assurance courses
Article No.: 4
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents...
Laboratory experiments for network security instruction
José Carlos Brustoloni
Article No.: 5
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid...
Dispelling 10 common disaster recovery myths: Lessons learned from Hurricane Katrina and other disasters
Brett J. L. Landry, M. Scott Koger
Article No.: 6
Disasters happen all the time; yet despite this, many organizations are caught unprepared or make unrealistic assumptions. These factors create environments that will fail during a disaster. Most information technology (IT) curricula do not cover...