Normal view MARC view ISBD view

Information Assurance and Security Education and Training : 8th IFIP WG 11. 8 World Conference on Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papersç

By: Dodge, Ronald C.
Contributor(s): Futcher, Lynn | Staff, United States Military Academy.
Material type: TextTextSeries: eBooks on Demand.IFIP Advances in Information and Communication Technology: Publisher: Berlin/Heidelberg : Springer Berlin Heidelberg, 2013Description: 1 online resource (308 p.).ISBN: 9783642393778.Genre/Form: Electronic books.Additional physical formats: Print version:: Information Assurance and Security Education and Training : 8th IFIP WG 11. 8 World Conference on Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne, Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected PapersçDDC classification: 005.8071 Online resources: Click here to view this ebook.
Contents:
Preface -- Organization -- Table of Contents -- WISE 8 -- Back to Basics: Information Security Education for the Youth via Gameplay -- 1 Introduction -- 2 Background -- 2.1 Information Security Education -- 2.2 Children and Educational Play -- 2.3 Brain-Compatible Education (BCE) -- 3 Case Study -- 3.1 Methodology -- 3.2 Description of the Context -- 3.3 The Artefact (Creation of BCE Information Security Board Game) -- 3.4 Research Instrument -- 3.5 Implementation (experiment) -- 3.6 Results and Analysis -- 4 Conclusions -- 5 Future Work -- References
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders -- 1 Introduction -- 2 Related Work -- 3 The Penetration Testing Framework -- 4 Overview of the Joint Exercise -- 5 Business Case Scenario -- 6 Work in Progress -- References -- Developing Cyber Competition Infrastructure Using the SCRUM Framework -- 1 Introduction -- 2 CCDC: The Collegiate Cyber Defense Competition -- 3 Background -- 4 Agile Software Development Methodologies -- 5 SCRUM, an Agile Method -- 6 How Ad-Hoc SCRUM was Applied to RMCCDC -- 7 Capability Maturity Model Integration
8 SCRUM and CMMI Mapping -- 9 Risk Management in Cyber Competitions -- 10 Conclusion -- References -- Security Education: The Challenge beyond the Classroom -- 1 Introduction -- 2 Too Much to Know? -- 3 Evidencing the Impact of Security Education -- 4 Knowing a Little, But Not Enough -- 5 Recommendations and Conclusions -- References -- Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security -- 1 Introduction -- 2 Roles and Functions of the ICT and Cybersecurity Professional -- 3 Structures and People -- 4 Policy, Laws and Regulations
5 Real Curricula and Industry Training -- 6 Conclusions -- References -- Information Assurance and Security in the ACM/IEEE CS2013 -- 1 Introduction -- 2 The Joint ACM/ IEEE Computer Science 2013 -- 2.1 Survey Input -- 2.2 Overview of the CS S2013 Body of Knowledge Structure -- 3 CS2013 Information Assurance and Security Knowledge Area -- 3.1 The Construction of the IAS KA -- 3.2 Distributed Nature of the IAS KA Topics -- 4 Conclusions and Recommendations -- References -- Fostering Content Relevant Information Security Awareness through Browser Extensions -- 1 Introduction -- 2 WebBrowsers
3 Browser Extensions -- 4 Information Security Awareness and Browsers -- 4.1 Browser State Analysis -- 4.2 Web Content Analysis -- 4.3 Data Storage Analysis -- 5 Awareness Model and Design -- 5.1 Analysis Engine -- 5.2 Event Engine -- 5.3 Awareness Content -- 5.4 Browser Extension Interface -- 6 Awareness Extension Usability -- 7 Conclusion -- References -- PKI Interoperability: Still an Issue? A Solution in the X.509 Realm -- 1 Introduction -- 2 What Is a Public Key Infrastructure? -- 3 The PKI Interoperability Obstacle -- 3.1 Juridical Differences -- 3.2 Organizational Differences
3.3 Technical Differences
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25 D634 2013 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=3092051 Available EBL3092051

Preface -- Organization -- Table of Contents -- WISE 8 -- Back to Basics: Information Security Education for the Youth via Gameplay -- 1 Introduction -- 2 Background -- 2.1 Information Security Education -- 2.2 Children and Educational Play -- 2.3 Brain-Compatible Education (BCE) -- 3 Case Study -- 3.1 Methodology -- 3.2 Description of the Context -- 3.3 The Artefact (Creation of BCE Information Security Board Game) -- 3.4 Research Instrument -- 3.5 Implementation (experiment) -- 3.6 Results and Analysis -- 4 Conclusions -- 5 Future Work -- References

Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders -- 1 Introduction -- 2 Related Work -- 3 The Penetration Testing Framework -- 4 Overview of the Joint Exercise -- 5 Business Case Scenario -- 6 Work in Progress -- References -- Developing Cyber Competition Infrastructure Using the SCRUM Framework -- 1 Introduction -- 2 CCDC: The Collegiate Cyber Defense Competition -- 3 Background -- 4 Agile Software Development Methodologies -- 5 SCRUM, an Agile Method -- 6 How Ad-Hoc SCRUM was Applied to RMCCDC -- 7 Capability Maturity Model Integration

8 SCRUM and CMMI Mapping -- 9 Risk Management in Cyber Competitions -- 10 Conclusion -- References -- Security Education: The Challenge beyond the Classroom -- 1 Introduction -- 2 Too Much to Know? -- 3 Evidencing the Impact of Security Education -- 4 Knowing a Little, But Not Enough -- 5 Recommendations and Conclusions -- References -- Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security -- 1 Introduction -- 2 Roles and Functions of the ICT and Cybersecurity Professional -- 3 Structures and People -- 4 Policy, Laws and Regulations

5 Real Curricula and Industry Training -- 6 Conclusions -- References -- Information Assurance and Security in the ACM/IEEE CS2013 -- 1 Introduction -- 2 The Joint ACM/ IEEE Computer Science 2013 -- 2.1 Survey Input -- 2.2 Overview of the CS S2013 Body of Knowledge Structure -- 3 CS2013 Information Assurance and Security Knowledge Area -- 3.1 The Construction of the IAS KA -- 3.2 Distributed Nature of the IAS KA Topics -- 4 Conclusions and Recommendations -- References -- Fostering Content Relevant Information Security Awareness through Browser Extensions -- 1 Introduction -- 2 WebBrowsers

3 Browser Extensions -- 4 Information Security Awareness and Browsers -- 4.1 Browser State Analysis -- 4.2 Web Content Analysis -- 4.3 Data Storage Analysis -- 5 Awareness Model and Design -- 5.1 Analysis Engine -- 5.2 Event Engine -- 5.3 Awareness Content -- 5.4 Browser Extension Interface -- 6 Awareness Extension Usability -- 7 Conclusion -- References -- PKI Interoperability: Still an Issue? A Solution in the X.509 Realm -- 1 Introduction -- 2 What Is a Public Key Infrastructure? -- 3 The PKI Interoperability Obstacle -- 3.1 Juridical Differences -- 3.2 Organizational Differences

3.3 Technical Differences

Description based upon print version of record.

There are no comments for this item.

Log in to your account to post a comment.