Entry Brustoloni:2006:LEN from jeric.bib
Last update: Sun Oct 15 02:29:09 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
Y |
Z
BibTeX entry
@Article{Brustoloni:2006:LEN,
author = "Jos{\'e} Carlos Brustoloni",
title = "Laboratory experiments for network security
instruction",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "5:1--5:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248458",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "We describe a sequence of five experiments on network
security that cast students successively in the roles
of computer user, programmer, and system administrator.
Unlike experiments described in several previous
papers, these experiments avoid placing students in the
role of attacker. Each experiment starts with an
in-class demonstration of an attack by the instructor.
Students then learn how to use open-source defense
tools appropriate for the role they are playing and the
attack at hand. Threats covered include eavesdropping,
dictionary, man-in-the-middle, port scanning, and
fingerprinting attacks. Defense skills gained by
students include how to forward ports with OpenSSH, how
to prevent weak passwords with CrackLib, how to salt
passwords, how to set up a simple certifying authority,
issue and verify certificates, and guarantee
communication confidentiality and integrity using
OpenSSL, and how to set up firewalls and IPsec-based
virtual private networks. At two separate offerings,
tests taken before and after each experiment showed
that each has a statistically significant and large
effect on students' learning. Moreover, surveys show
that students finish the sequence of experiments with
high interest in further studies and work in the area
of security. These results suggest that the experiments
are well-suited for introductory security or networking
courses.",
acknowledgement = ack-nhfb,
articleno = "5",
keywords = "certificate; certifying authority; course; dictionary
attack; eavesdropping; education; experiment;
fingerprinting; firewall; IPsec; man-in-the-middle;
password; port scanning; security; SSH; SSL; VPN",
}
Related entries
- 1-2es-z-z-4,
2(4)1,
5(4)1,
5(4)2,
5(4)3,
6(1)2,
6(1)3,
6(2)1,
6(3)2,
6(4)2,
6(4)4,
7(1)1,
7(1)3,
7(3)2,
7(4)1,
7(4)3,
7(4)6,
8(1)3,
8(2)4,
8(3)8
- appropriate,
8(1)1
- area,
5(1)1,
6(2)2,
6(4)3,
6(4)4,
7(4)4,
8(4)11
- attack,
6(4)6
- avoid,
6(3)6
- communication,
4(1)1-1,
8(2)6
- computer, 1-2es-z-z,
1(4)18,
1(4)31,
1(4)46,
1(4)60,
1(4)81,
2(1)1,
2(1)17,
2(1)131,
2(4)1,
3(2)1,
3(2)1,
3(3)1,
4(1)1,
4(1)1-1,
4(2)3,
4(2)4,
5(2)1,
5(4)1,
5(4)2,
5(4)3,
6(2)2,
6(3)1,
6(3)3,
6(3)4,
6(3)5,
6(3)6,
6(4)1,
6(4)2,
6(4)3,
6(4)4,
6(4)6,
7(2)1,
7(2)2,
7(4)2,
7(4)4,
7(4)5,
7(4)6,
8(1)2,
8(1)3,
8(2)5,
8(2)6,
8(3)7,
8(3)8,
8(4)11
- course, 1-1es-z-z-2,
2(4)1,
4(1)1,
4(3)1-1,
5(4)1,
5(4)2,
5(4)3,
6(1)2,
6(2)1,
6(2)2,
6(3)1,
6(3)4,
6(3)5,
6(3)6,
6(4)3,
6(4)4,
6(4)6,
7(3)1,
7(4)3,
7(4)4,
7(4)6,
8(1)3,
8(3)8,
8(3)9
- covered,
7(4)3
- describe,
6(1)2,
6(2)2,
6(3)6,
7(3)2,
8(2)5,
8(2)6,
8(3)9
- described,
6(3)5,
8(1)2,
8(4)11
- each,
6(2)2,
7(1)1,
7(1)2,
7(4)3
- education, 1-1es-z-z-6, 1-2es-z-z-2,
2(4)1,
4(1)1,
4(2)1,
4(2)2,
4(2)3,
4(2)4,
4(3)1,
5(4)1,
6(1)2,
6(1)3,
6(3)1,
6(3)2,
6(4)1,
6(4)2,
6(4)3,
7(1)1,
7(1)2,
7(1)3,
7(2)1,
7(3)1,
7(3)2,
7(4)1,
7(4)2,
8(1)2,
8(1)3,
8(2)5,
8(2)6,
8(3)9
- effect,
2(4)1,
8(3)7
- five,
7(4)4,
8(1)3
- further,
6(1)2,
6(2)1,
6(3)2
- guarantee,
7(3)2
- has,
5(4)1,
6(1)3,
6(3)2,
6(4)3,
7(4)5,
7(4)6,
8(1)3,
8(3)8,
8(4)12
- high,
8(2)5,
8(3)9
- how,
2(1)17,
3(3)1,
7(4)1,
7(4)5,
7(4)6,
8(1)2
- include,
2(1)17,
5(4)1,
5(4)3,
6(3)1,
6(3)4,
6(4)1,
6(4)4,
7(1)3,
7(4)3
- instruction,
4(1)1,
5(4)3,
6(3)3,
7(4)3
- instructor,
6(3)6,
6(4)3,
7(1)2,
7(3)1
- integrity,
6(3)5
- interest,
7(4)1
- introductory,
1(4)31,
2(4)1,
5(4)1,
5(4)2,
6(3)4,
6(4)4,
7(4)6
- issue,
2(1)1,
4(1)1,
4(2)1,
4(3)1,
5(2)1,
5(3)z-1,
6(1)3,
6(3)1,
6(3)2,
6(4)1,
7(2)1,
7(4)1,
7(4)4,
8(1)1,
8(2)4,
8(3)7,
8(4)11
- laboratory,
2(2)1,
4(2)2,
5(4)2,
6(4)1,
6(4)2,
6(4)3,
6(4)4,
8(1)3
- large,
7(4)3
- learn,
7(1)2,
7(4)6
- Moreover,
6(2)1,
8(1)3
- network,
4(3)1,
5(1)1,
6(2)1,
6(4)1,
6(4)2,
6(4)4,
6(4)6
- networking,
3(2)1,
6(4)2
- paper,
7(3)2,
7(4)1,
7(4)5
- previous,
7(4)4,
7(4)6,
8(4)11
- private,
6(3)2
- programmer,
2(2)1,
5(2)1,
6(1)1,
7(4)2
- result,
5(4)1,
5(4)2,
6(1)2,
6(2)1,
6(4)6,
7(1)2,
7(4)3,
8(1)2,
8(1)3,
8(3)8
- role,
7(4)3,
7(4)6
- security,
6(3)1,
6(3)2,
6(3)3,
6(3)4,
6(3)5,
6(4)1,
6(4)2,
6(4)3,
6(4)4,
6(4)6,
7(3)2,
8(1)3
- sequence,
6(4)3
- set,
6(3)1,
6(3)4,
7(1)2,
7(1)3,
7(4)1,
7(4)4,
8(1)3
- several,
8(2)6
- show,
6(2)1,
6(3)3,
8(4)12
- significant,
6(1)3,
6(4)3,
7(1)2,
8(3)8,
8(4)10,
8(4)12
- simple,
2(1)17,
5(4)1,
6(3)6
- skills,
6(2)1,
6(3)2,
7(4)4,
8(1)3
- start,
6(3)4,
6(4)3
- student,
3(1)1,
3(1)1-1,
3(3)1,
4(1)1,
5(4)1,
5(4)2,
5(4)3,
6(1)2,
6(2)1,
6(3)1,
6(3)2,
6(3)3,
6(3)6,
6(4)1,
6(4)3,
6(4)4,
7(1)2,
7(1)3,
7(2)1,
7(4)2,
7(4)3,
7(4)4,
7(4)5,
7(4)6,
8(1)2,
8(1)3,
8(2)4,
8(2)5,
8(3)8,
8(3)9,
8(4)11,
8(4)12
- study,
5(3)z-5,
6(2)1,
7(1)3,
7(4)2,
7(4)3,
7(4)6,
8(1)2,
8(3)8,
8(3)9,
8(4)11
- suggest,
6(1)1,
6(1)2,
6(3)3,
7(4)2,
8(3)9
- surveys,
5(4)3
- system, 1-1es-z-z, 1-1es-z-z-2, 1-1es-z-z-6, 1-1es-z-z-7,
2(1)5,
2(4)1,
3(3)1,
4(4)1,
5(3)z-4,
6(1)2,
6(1)3,
6(2)2,
6(3)6,
6(4)2,
6(4)6,
7(1)2,
7(1)3,
8(1)3,
8(2)6,
8(4)12
- taken,
6(2)1,
7(1)2
- test,
3(3)1,
6(4)6,
8(2)6
- then,
6(2)2,
7(1)2,
7(4)4
- threat,
6(4)1,
6(4)6
- tool, 1-1es-z-z-8,
1(4)46,
1(4)60,
3(1)1,
3(1)1-1,
3(1)1,
5(4)1,
6(1)1,
6(1)2,
6(2)1,
6(3)1,
6(3)4,
6(3)6,
6(4)3,
7(1)2,
7(4)1,
7(4)3
- two,
7(1)3,
7(4)3,
7(4)4,
7(4)5,
8(1)1,
8(3)7
- use,
2(1)17,
3(1)1-1,
5(4)1,
5(4)3,
6(1)2,
6(3)4,
6(3)6,
6(4)2,
7(1)1,
7(1)2,
7(1)3,
7(3)2,
7(4)3,
7(4)5,
7(4)6,
8(2)4,
8(2)5,
8(3)9,
8(4)11
- user,
2(1)17,
2(2)3,
6(2)1,
6(3)5,
7(1)3
- using, 1-1es-z-z-2, 1-1es-z-z-4,
1(4)111,
2(1)17,
4(2)4,
4(3)1,
4(3)1-1,
6(3)3,
7(1)3,
7(4)4,
7(4)5,
8(1)3,
8(2)4,
8(3)8,
8(4)11,
8(4)12
- virtual,
2(1)17,
5(4)3
- work,
5(4)1,
6(3)5,
7(1)2,
7(4)5