Access Restriction

Author Brustoloni, Jos Carlos
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Copyright Year ©2006
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Certificate ♦ IPsec ♦ SSH ♦ SSL ♦ VPN ♦ Certifying authority ♦ Course ♦ Dictionary attack ♦ Eavesdropping ♦ Education ♦ Experiment ♦ Fingerprinting ♦ Firewall ♦ Man-in-the-middle ♦ Password ♦ Port scanning ♦ Security
Abstract We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an attack by the instructor. Students then learn how to use open-source defense tools appropriate for the role they are playing and the attack at hand. Threats covered include eavesdropping, dictionary, man-in-the-middle, port scanning, and fingerprinting attacks. Defense skills gained by students include how to forward ports with OpenSSH, how to prevent weak passwords with CrackLib, how to salt passwords, how to set up a simple certifying authority, issue and verify certificates, and guarantee communication confidentiality and integrity using OpenSSL, and how to set up firewalls and IPsec-based virtual private networks. At two separate offerings, tests taken before and after each experiment showed that each has a statistically significant and large effect on students' learning. Moreover, surveys show that students finish the sequence of experiments with high interest in further studies and work in the area of security. These results suggest that the experiments are well-suited for introductory security or networking courses.
ISSN 15314278
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2006-12-01
Publisher Place New York
e-ISSN 15314278
Journal Journal on Educational Resources in Computing (JERIC)
Volume Number 6
Issue Number 4

Open content in new tab

   Open content in new tab
Source: ACM Digital Library