Full Text Documents

Search


Table of Contents
Information Assurance and Security Education and Training
Ronald C. Dodge Jr., Lynn Futcher (Eds.)
Front Matter

WISE 8


Back to Basics: Information Security Education for the Youth via Gameplay
Rayne Reid, Johan Niekerk
1-10
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
Helen Armstrong, Matt Bishop, Colin Armstrong
11-19
Developing Cyber Competition Infrastructure Using the SCRUM Framework
Heath Novak, Daniel Likarish, Erik Moore
20-31
Security Education: The Challenge beyond the Classroom
Steven Furnell
32-38
Background to the Development of a Curriculum for the History of “Cyber” and “Communications” Security
William Caelli, Vicky Liu, Dennis Longley
39-47
Information Assurance and Security in the ACM/IEEE CS2013
Ronald Dodge
48-57
Fostering Content Relevant Information Security Awareness through Browser Extensions
Marius Potgieter, Craig Marais, Mariana Gerber
58-67
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm
Ahmad Wazan, Romain Laborde, François Barrere, Abdelmalek Benzekri, David Chadwick
68-82
The Power of Hands-On Exercises in SCADA Cyber Security Education
Elena Sitnikova, Ernest Foo, Rayford Vaughn
83-94
Business Continuity and Information Security Maintenance" Masters’ Training Program
Natalia Miloslavskaya, Mikhail Senatorov, Alexandr Tolstoy, Sergei Zapechnikov
95-102
Cyber Safety for School Children
Johan Niekerk, Kerry-Lynn Thomson, Rayne Reid
103-112
A Review of IFIP TC 11 WG 11.8 Publications through the Ages
Lynn Futcher, Louise Yngström
113-122

WISE 7


Preparing Our Undergraduates to Enter a Cyber World
Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng
123-130
How to Secure the Cloud Based Enterprise Information System
Yanzhen Qu
131-139
Robust Programming by Example
Matt Bishop, Chip Elliott
140-147
An Approach to Visualising Information Security Knowledge
Colin Armstrong
148-155
Creating Shareable Security Modules
Kara Nance, Blair Taylor, Ronald Dodge, Brian Hay
156-163
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula
Lynn Futcher, Johan Niekerk
164-171
Two Approaches to Information Security Doctoral Research
Helen Armstrong
172-179
Towards Information Security Education 3.0
Johan Niekerk, Ryan Goss
180-187
The Use of Second Life® to Teach Physical Security across Different Teaching Modes
Vincent Nestler, Erik Moore, Kai-Yi Huang, Devshikha Bose
188-195
An Enterprise Anti-phishing Framework
Edwin Frauenstein, Rossouw Solms
196-203
Teaching Computer Security with a Hands-On Component
Narayan Murthy
204-210
The Strengths and Challenges of Analogical Approaches to Computer Security Education
Matt Bishop, Kara Nance
211-217

WISE 6


Reaching Today’s Information Security Students
Helen Armstrong, Ron Dodge, Colin Armstrong
218-225
Some “Secure Programming” Exercises for an Introductory Programming Class
Matt Bishop
226-232
A SWOT Analysis of Virtual Laboratories for Security Education
Alan Davidson, Javier Puente Martinez, Markus Huber
233-240
Determinants of Password Security: Some Educational Aspects
Lynette Drevin, Hennie Kruger, Tjaart Steyn
241-248
Improving Awareness of Social Engineering Attacks
Aaron Smith, Maria Papadaki, Steven Furnell
249-256
A Risk-Based Approach to Formalise Information Security Requirements for Software Development
Lynn Futcher, Rossouw Solms
257-264
Two Case Studies in Using Chatbots for Security Training
Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein
265-272
Information Security Specialist Training on the Basis of ISO/IEC 27002
Natalia Miloslavskaya, Alexander Tolstoy
273-279
Using Bloom’s Taxonomy for Information Security Education
Johan Niekerk, Rossouw Solms
280-287
Advancing Digital Forensics
Katrin Franke, Erik Hjelmås, Stephen Wolthusen
288-295

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/