ASIA Main Page
Call for Papers
Best Paper Awards
NYS Cyber Security Conf.
Directions & Parking
UAlbany Business Website
Want to Sponsor?
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014|
Enhancing Security Education with Hands-On Laboratory Exercises
Wenliang Du, Karthick Jayaraman, & Norren B. Gaubatz
We present an instructional suite of labs that can help in teaching security courses. Our labs are publicly available for use. We have used these labs in teaching security courses and also helped several other instructors adopt these labs to suit their style of teaching. Based on this experience, we present some guidelines for using these labs in security courses. Furthermore, we also describe the results of using these labs among students.See the ASIA ‘10 Proceedings for the complete papers...
One person's "paranoia" is another person's "engineering redundancy".
- Marcus J. Ranum
The superior man, when resting in safety, does not forget that danger may come. When in state of security he does not forget disorder may come. Thus his person is not endangered and his states and all their clans are preserved.
- Confucius (551-479 BC)
Securing a computer system has traditionally been a battel of wits: the penetrator tries to find the holes, and the designer tries to close them.