Supporting the Education of Information Assurance with a Laboratory Environment
Abstract
Too many students are graduating from colleges and universities without taking a single course in information assurance. The need for students to receive more and better education in information assurance is undisputed. For those educational institutions already requiring and/or teaching such courses, the educational experience can be greatly enhanced with a supportive laboratory environment where carefully chosen hands-on tutorials or exercises can be assigned to support the material being presented in the classroom. This paper describes the experiences of supporting information assurance exercises and tutorials at the Naval Postgraduate School.
Recommendations are provided so that others may learn from the experience.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
Configuration management evaluation guidance for high robustness systems
Gross, Michael E. (Monterey, California. Naval Postgraduate School, 2004-03);Configuration Management (CM) plays a vital role in the development of trusted computing systems. The Common Criteria (CC) provides a framework for performing Information Technology (IT) security evaluations of these systems ... -
Center for Information Systems Studies Security and Research (CISR) Research: Projects (archived)
Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR) (2011-03);The overarching objective of Information Assurance (IA) studies is to improve security in real systems. The CISR program enables students to understand the kinds of technologies that are available to solve current computer ... -
Use of Evaluation Criteria in Security Education
Nguyen, Thuy D.; Irvine, Cynthia E. (International Conference on Information Warfare and Security (ICIW 2008), April 2008, Omaha, Nebraska, USA, 2008-04-01);Success in information warfare will depend on resilient, reconstitutable cyber assets and the ability to assess and respond to attacks. A cornerstone of this success will be the ability of Information Assurance professionals ...