Volume 1 Number 2 December 2014

    
Learning Cloud Computing and Security Through Cloudsim Simulation

Ming Yang, Becky Rutherfoord, Edward Jung

https://doi.org/

Abstract Cloud computing is fast evolving and growing and is rapidly transforming the IT service industry. Many universities are offering or planning to offer cloud computing courses to meet the growing demands for cloud computing professionals. However, most of the course offerings nowadays focus on theoretical aspects of cloud computing, and there is a lack of practical learning experiences for students.... Read More


Using Contingency Planning Model to Mitigate the Impact of the Inevitable Disaster at the Class Level

Randall Craig Reid, Sherwood Lane Lambert

https://doi.org/

Abstract This paper discusses the need to establish a contingency plan at the university class level to mitigate the impacts of a disaster. It places the class room plan in context of the contingency plans of higher organizational units. It related the authors’ experience with multiple natural disasters and how those experiences can be used to establish a contingency plan that is... Read More


Embedded and Control Systems Security Projects

Guillermo A. Francia, III, Jay Snellen III

https://doi.org/

Abstract Robust and resilient cyber defense mechanisms and better educated future workforce are vital components for the protection of our nation’s critical infrastructures. As such, the need for an enhanced information assurance and security curriculum with emphasis on embedded and control systems can no longer be ignored. Recognizing this training gap, we designed and implemented a collection of laboratory projects for an... Read More


A Course Module on Clickjacking

Lindsay Simpkins, Xiaohong Yuan, Junghee Kim

https://doi.org/

Abstract Clickjacking is a form of UI-Redress where a victim thinks they are browsing the webpage they see, but click actions are actually on a hidden webpage. Typically, the victim must already be authenticated on the hidden page for the attack to work. There are several available methods to detect or prevent clickjacking attacks on both the server and client side. The... Read More


Motivating Secure Coding Practices in a Freshman-Level Programming Course

Bryson R. Payne , Aaron R. Walker

https://doi.org/

Abstract Secure application development is becoming even more critical as the impact of insecure code becomes deeper and more pervasive in our personal and professional lives. The approach described in this paper seeks to motivate computer science students to write secure code almost from the very beginning by focusing on concrete examples of common software vulnerabilities in the second freshman-level programming course.... Read More


Intructional Perspective: A Course Module on Mobile Malware

Perron Johnson , Philip Harris, Keheira Henderson, Xiaohong Yuan , Li Yang

https://doi.org/

Abstract Due to the emerging popularity of mobile devices, topics on mobile computing and mobile security started to gain importance in university curriculum. Some universities created concentrated courses to teach these topics. Another approach is to develop course modules on these topics and integrate them into existing courses. This paper introduces a course module on mobile malware, which can be integrated into... Read More