Abstract
This paper describes two laboratory projects which were developed for use in a computer security course. The first project requires that students examine and analyze an existing computer network environment in order to find security flaws. A sample network environment containing numerous flaws was developed for this purpose. The second project requires students to analyze the security needs of a hypothetical college with respect to its academic computing network and establish a secure computing environment which meets those needs. The environment for both projects consisted of a network of IBM compatible computers running Artisoft's LANtastic Network Operating System for DOS.
- [1] Artisoft, Inc. A Complete Guide to The LANtastic Network Operating System, Tucson, AZ, 1992.Google Scholar
- [2] Artisoft, Inc. LANtastic Network Operating System User's Manual, Tucson, AZ, 1992.Google Scholar
- [3] "Can Anyone Catch NetWare?", LAN, The Network Solutions Magazine, August 1994 p14.Google Scholar
Index Terms
Laboratory projects for promoting hands-on learning in a computer security course
Recommendations
A laboratory based capstone course in computer security for undergraduates
SIGCSE '06: Proceedings of the 37th SIGCSE technical symposium on Computer science educationWe describe a laboratory based capstone course in computer security for undergraduates. The course is based on a sequence of hands-on laboratory exercises for four teams of students. It emphasizes defensive tools and techniques at the expense of attacks;...
Georgia tech information security center hands-on network security laboratory
An undergraduate internetwork, security-teaching laboratory, which includes both defensive and offensive security laboratory experimentation, is described. This laboratory is oriented toward an introductory internetworking security class and is intended ...
Design of a computer security teaching and research laboratory (abstract only)
SIGCSE '12: Proceedings of the 43rd ACM technical symposium on Computer Science EducationTo enhance the learning process a certain amount of hands-on experience is desirable to supplement the theory portion of computer security-related courses. This includes courses in information assurance, database security, computer security and computer ...






Comments