Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Assurance and Security Education and Training
Ronald C. Dodge Jr., Lynn Futcher (Eds.)
Front Matter

WISE 8


Back to Basics: Information Security Education for the Youth via Gameplay
Rayne Reid, Johan Niekerk
1-10
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
Helen Armstrong, Matt Bishop, Colin Armstrong
11-19
Developing Cyber Competition Infrastructure Using the SCRUM Framework
Heath Novak, Daniel Likarish, Erik Moore
20-31
Security Education: The Challenge beyond the Classroom
Steven Furnell
32-38
Background to the Development of a Curriculum for the History of “Cyber” and “Communications” Security
William Caelli, Vicky Liu, Dennis Longley
39-47
Information Assurance and Security in the ACM/IEEE CS2013
Ronald Dodge
48-57
Fostering Content Relevant Information Security Awareness through Browser Extensions
Marius Potgieter, Craig Marais, Mariana Gerber
58-67
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm
Ahmad Wazan, Romain Laborde, François Barrere, Abdelmalek Benzekri, David Chadwick
68-82
The Power of Hands-On Exercises in SCADA Cyber Security Education
Elena Sitnikova, Ernest Foo, Rayford Vaughn
83-94
Business Continuity and Information Security Maintenance" Masters’ Training Program
Natalia Miloslavskaya, Mikhail Senatorov, Alexandr Tolstoy, Sergei Zapechnikov
95-102
Cyber Safety for School Children
Johan Niekerk, Kerry-Lynn Thomson, Rayne Reid
103-112
A Review of IFIP TC 11 WG 11.8 Publications through the Ages
Lynn Futcher, Louise Yngström
113-122

WISE 7


Preparing Our Undergraduates to Enter a Cyber World
Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng
123-130
How to Secure the Cloud Based Enterprise Information System
Yanzhen Qu
131-139
Robust Programming by Example
Matt Bishop, Chip Elliott
140-147
An Approach to Visualising Information Security Knowledge
Colin Armstrong
148-155
Creating Shareable Security Modules
Kara Nance, Blair Taylor, Ronald Dodge, Brian Hay
156-163
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula
Lynn Futcher, Johan Niekerk
164-171
Two Approaches to Information Security Doctoral Research
Helen Armstrong
172-179
Towards Information Security Education 3.0
Johan Niekerk, Ryan Goss
180-187
The Use of Second Life® to Teach Physical Security across Different Teaching Modes
Vincent Nestler, Erik Moore, Kai-Yi Huang, Devshikha Bose
188-195
An Enterprise Anti-phishing Framework
Edwin Frauenstein, Rossouw Solms
196-203
Teaching Computer Security with a Hands-On Component
Narayan Murthy
204-210
The Strengths and Challenges of Analogical Approaches to Computer Security Education
Matt Bishop, Kara Nance
211-217

WISE 6


Reaching Today’s Information Security Students
Helen Armstrong, Ron Dodge, Colin Armstrong
218-225
Some “Secure Programming” Exercises for an Introductory Programming Class
Matt Bishop
226-232
A SWOT Analysis of Virtual Laboratories for Security Education
Alan Davidson, Javier Puente Martinez, Markus Huber
233-240
Determinants of Password Security: Some Educational Aspects
Lynette Drevin, Hennie Kruger, Tjaart Steyn
241-248
Improving Awareness of Social Engineering Attacks
Aaron Smith, Maria Papadaki, Steven Furnell
249-256
A Risk-Based Approach to Formalise Information Security Requirements for Software Development
Lynn Futcher, Rossouw Solms
257-264
Two Case Studies in Using Chatbots for Security Training
Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein
265-272
Information Security Specialist Training on the Basis of ISO/IEC 27002
Natalia Miloslavskaya, Alexander Tolstoy
273-279
Using Bloom’s Taxonomy for Information Security Education
Johan Niekerk, Rossouw Solms
280-287
Advancing Digital Forensics
Katrin Franke, Erik Hjelmås, Stephen Wolthusen
288-295

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/