Volume 2 Number 1 June 2015

    
An Analysis of Academic Background Factors and Performance in Cyber Defense Competitions

Jim Hoag

https://doi.org/

Abstract As Cybersecurity evolves as a field, academic programs in higher education respond to include new content and activities. To prepare the next generation of Cybersecurity professionals, curriculum are modified, new courses developed, and cybersecurity-based extra-curricular activities are increasing in popularity. Collegiate Cyber Defense competitions have emerged to give students an opportunity to experience real-life situations and have also received attention as a learning environment.... Read More


The Cyber Security Fair: An Effective Method For Training Users To Improve Their Cyber Security Behaviors?

Stephen Larson

https://doi.org/

Abstract The effort to raise cyber security awareness is widespread and growing. At our small liberal arts university, we held a cyber security fair, with the topics presented by students to students. This paper describes our experience and our effort to determine whether a cyber security fair is an appropriate venue for raising awareness of cyber security issues and to train users to improve... Read More


Enhance Learning through Developing Network Security Hands-on Lab for Online Students

Jianhua YANG, Thomas Reddington

https://doi.org/

Abstract Online teaching and learning have been becoming more and more popular because students can study at anywhere and anytime. The reality is that it is hard to ask online students to conduct hands-on labs which normally require students to be on-campus. Computer network security is a course in which hands-on labs play a key role in enhancing students learning performance. In this paper... Read More


A Comparison of Different Methods of Instruction in Cryptography

Frank H. Katz

https://doi.org/

Abstract Cryptography is the foundation on which information and cyber security is built. As Mark Stamp has written, “cryptography or ‘secret codes’ are a fundamental information security tool.” (Stamp, et al., 2006) Without the ability to encrypt and decrypt messages or data, the fundamental characteristic of confidentiality, which is the prevention of “unauthorized reading of information,” (Stamp, et al., 2006) is lost. This... Read More


Design Insider Threat Hands-on Labs

Hongmei Chi, Clement Allen, David Angulo Rubio

https://doi.org/

Abstract Insider threat continues to be of serious concern to governmental organizations and private companies. Vulnerabilities of the digital information being shared through mobile devices and Internet clouds increases exponentially due to IT security mechanisms not being capable of controlling what is beyond company network limits. One of the solutions could include providing an effective interactive framework to train future and current Information Technology... Read More