Entry Brustoloni:2006:LEN from jeric.bib

Last update: Sun Oct 15 02:29:09 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | Y | Z

BibTeX entry

@Article{Brustoloni:2006:LEN,
  author =       "Jos{\'e} Carlos Brustoloni",
  title =        "Laboratory experiments for network security
                 instruction",
  journal =      j-JERIC,
  volume =       "6",
  number =       "4",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1248453.1248458",
  ISSN =         "1531-4278",
  bibdate =      "Fri Jun 20 10:12:35 MDT 2008",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jeric/;
                 http://www.math.utah.edu/pub/tex/bib/jeric.bib",
  abstract =     "We describe a sequence of five experiments on network
                 security that cast students successively in the roles
                 of computer user, programmer, and system administrator.
                 Unlike experiments described in several previous
                 papers, these experiments avoid placing students in the
                 role of attacker. Each experiment starts with an
                 in-class demonstration of an attack by the instructor.
                 Students then learn how to use open-source defense
                 tools appropriate for the role they are playing and the
                 attack at hand. Threats covered include eavesdropping,
                 dictionary, man-in-the-middle, port scanning, and
                 fingerprinting attacks. Defense skills gained by
                 students include how to forward ports with OpenSSH, how
                 to prevent weak passwords with CrackLib, how to salt
                 passwords, how to set up a simple certifying authority,
                 issue and verify certificates, and guarantee
                 communication confidentiality and integrity using
                 OpenSSL, and how to set up firewalls and IPsec-based
                 virtual private networks. At two separate offerings,
                 tests taken before and after each experiment showed
                 that each has a statistically significant and large
                 effect on students' learning. Moreover, surveys show
                 that students finish the sequence of experiments with
                 high interest in further studies and work in the area
                 of security. These results suggest that the experiments
                 are well-suited for introductory security or networking
                 courses.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  keywords =     "certificate; certifying authority; course; dictionary
                 attack; eavesdropping; education; experiment;
                 fingerprinting; firewall; IPsec; man-in-the-middle;
                 password; port scanning; security; SSH; SSL; VPN",
}

Related entries