skip to main content
article
Free Access

A proposal for a computer security course

Authors Info & Claims
Published:01 June 1999Publication History
Skip Abstract Section

Abstract

Computer security is a relatively new subject in computer science curricula. We notice this in a moderate academic incidence or in an incomplete syllabus in most of the computer science teaching. The main goal of this article is to share the two years academic experience of the authors in this matter. The article makes a proposal for a first computer security subject. This proposal discusses theoretical and practical contents and the use of a different didactic methodology. Finally, the article refers to the positive results obtained on the students learning and acceptation of the contents taught and the used methodology. Marks and the results of a test made to the student population have confirmed this.

References

  1. Bruce Schneier. Applied Cryptography. John Wiley & Sons Eds, 1994.Google ScholarGoogle Scholar
  2. Fakete, A. & Greening, A. Designing closed laboratories for a Computer Science course. SIGCSE'96 2/96, Philadelphia, PA, USA. 1996, pp. 295-299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Garfinkel, S. & Spafford G. Practical Unix & Internet security. O'Reilly & Associates Eds. (2nd ed).1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Knox, D., Wolz, U, Joyce, D., Koffman, E., Krone, J., Laribi, A., Myers, J. P., Proulx, V. K. & Reek, K. A. Use of laboratories in Computer Science education: guidelines for good practice. Report of the Working Group on Computing Laboratories. Integrating Technology into C.S.E. 6/96 Barcelona, Spain. 1996, pp. 167-181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Prey, J. C. Cooperative learning and closed laboratories in an undergraduate computer science curriculum. Integrating Technology into C.S.E. 6/96 Barcelona, Spain, 1996, pp. 23-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Russell, D. & Gangemi, G. T. Computer Security Basics. O'Reilly & Associates. (3rd. ed). 1992.Google ScholarGoogle Scholar
  7. White, G. B., Fisch, E. A. & Pooch, U. W. Computer System and Network Security. CRC Press Inc. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

(auto-classified)
  1. A proposal for a computer security course

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGCSE Bulletin
          ACM SIGCSE Bulletin  Volume 31, Issue 2
          June 1999
          93 pages
          ISSN:0097-8418
          DOI:10.1145/571535
          Issue’s Table of Contents

          Copyright © 1999 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 1999

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!