295
Views
1
CrossRef citations to date
0
Altmetric
Articles

PLAYGROUND: preparing students for the cyber battleground

Pages 255-276 | Received 16 Oct 2015, Accepted 07 Dec 2016, Published online: 11 Jan 2017

References

  • Anantapadmanabhan, V., Frankl, P., Memon, N., & Naumovich, G. (2003). Design of a laboratory for information security education. In C. Irvine & H. Armstrong (Eds.), Security Education and Critical Infrastructures (pp. 61–73). Norwell, MA: Kluwer Academic Publishers.
  • Anderson, R. J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Indianapolis, IN: Wiley Publishing.
  • CERT (2016). CERT STEPfwd. Retrieved December 2, 2016, from http://stepfwd.cert.org/lms
  • Chess, D., & White, S. (2000). An undetectable computer virus. Proceedings of the Virus Bulletin Conference 2000, Orlando, FL.
  • Chinnow, J., Bye, R., Schmidt, S., Bsufka, K., Camtepe, S. A., & Albayrak, S. (2009). An Extensible Simulation Framework for Critical Infrastructure Security (Technical Report TUB-DAI 09/09-01, DAI-Labor). Berlin: Technische Universität. Retrieved from http://www.dai-labor.de/fileadmin/files/publications/TRNessi20909-1.pdf
  • Cohen, F. (1987). Computer viruses. Computer Security, 6, 22–35.
  • Gaffer, S., & Daniyal, A. (2012). Using virtual security lab in teaching cryptography. Modern Education and Computer Science, 1, 26–32.
  • Google Developers (2016). Protocol buffers. Retrieved December 3, 2016, from https://developers.google.com/protocol-buffers/
  • Hirstein, W., & Ramachandran, V. (1997). Capgras syndrome: A novel probe for understanding the neural representation of the identity and familiarity of person. Proceedings of the Royal Society of London. Series B: Biological Sciences (Vol. 264, pp. 437–444). London: The Royal Society.
  • Joncheray, L. (1995). A simple active attack against tcp. Proceedings of the 5th Conference on USENIX UNIX Security Symposium. SSYM’95 (Vol. 5, pp. 2–2). Berkeley, CA, USA: USENIX Association.
  • Leveson, N. G. (1993). An investigation of the therac-25 accidents. IEEE Computer, 26, 18–41.
  • Lewis, J., & Lunsford, P. (2010). Tls man-in-the-middle laboratory exercise for network security education. Proceedings of the 2010 ACM Conference on Information Technology Education, SIGITE ’10 (pp. 117–120). ACM: New York, NY, USA.
  • Liljenstam, M., Liu, J., Nicol, D., Yuan, Y., Yan, G., & Grier, C. (2005). RINSE: The real-time immersive network simulation environment for network security exercises. Proceedings -- Workshop on Principles of Advanced and Distributed Simulation, PADS (pp. 119–128). Monterey, CA: IEEE Computer Society.
  • Marsá-Maestre, I., de la Hoz, E., Giménez-Guzmán, J. M., & López-Carmona, M. A. (2013). Design and evaluation of a learning environment to effectively provide network security skills. Computers & Education, 69, 225–236.
  • Papanikolaou, A., Karakoidas, V., Vlachos, V., Venieris, A., Ilioudis, C., & Zouganelis, G. (2011). A hacker’s perspective on educating future security experts. 15th Panhellenic Conference on Informatics with international participation (PCI 2011) (pp. 68–72). Kastoria, Greece.
  • Postel, J. (1981). RFC 791: Internet Protocol. Retrieved from https://tools.ietf.org/html/rfc791
  • Saha, A. (2012). Parallel pi approximation algorithm. Retrieved December 4, 2013, from https://gist.github.com/amitsaha/2036026
  • Schneier, B. (2000). Semantic attacks: The third wave of network attacks. Retrieved from https://www.schneier.com/crypto-gram/archives/2000/1015.html#1
  • Standard, S., Greenlaw, R., Phillips, A., Stahl, D., & Schultz, J. (2013). Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course. ACM Inroads, 4, 52–64.
  • The PyPy Project (2016). Pypy’s sandboxing features. Retreived December 3, 2016, from http://doc.pypy.org/en/latest/sandbox.html
  • Thompson, K. (1984). Reflections on trusting trust. Commun. ACM, 27, 761–763.
  • Trabelsi, Z. (2012). Switch’s cam table poisoning attack: Hands-on lab exercises for network security education. Proceedings of the Fourteenth Australasian Computing Education Conference. ACE ’12 (Vol. 123, pp. 113–120). Darlinghurst, Australia: Australian Computer Society Inc.
  • Turing, A. M. (1936). On computable numbers, with an application to the Entscheidungsproblem. Proceedings of the London Mathematical Society, 2, 230–265.
  • Twisted Matrix Labs (2016). What is twisted?. Retrieved December 3, 2016, from https://twistedmatrix.com/trac/
  • Werther, J., Zhivich, M., Leek, T., & Zeldovich, N. (2011). Experiences in cyber security education: The mit lincoln laboratory capture-the-flag exercise. Proceedings of the 4th Conference on Cyber Security Experimentation and Test, CSET’11 (pp. 12–12). Berkeley, CA, USA: USENIX Association.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.