Security challenges in IT infrastructure for cybersecurity curriculum support

With the evolving challenges in cyberspace there is a need for curriculum development in cybersecurity. Students in a cybersecurity curriculum need to access and learn about topics in cybersecurity such that they have a clear understanding of the sophistication of threats such that they can implement mitigation response. Development of hands on curriculum in cybersecurity therefore poses significant challenges to the information technology infrastructure in an instructional environment. Among the various challenges one of the significant challenges involves attack simulations of a cyber-attack requiring the creation of a walled infrastructure to accommodate the equipment where computing services are hosted. The challenges of containing malicious software which can be released by accident are also significant to the IT infrastructure. In this paper we show how the walled infrastructure with computing service can be created such that cybersecurity curriculum can be institutionalized where students locally and remotely can access this infrastructure. The walled IT infrastructure is based on risk escalation wherein connectivity and access to computing resources is contained as risk to computing infrastructure increases. We also show IT challenges in curriculum development on topics of hardware, software and networking for cybersecurity and how virtualization is a means for solving the challenges in those respective topics.

[1]  Ed Crowley Open source, live CD based, security lab design: tutorial presentation , 2006 .

[2]  Victor Piotrowski NSF investments in cybersecurity research and education , 2011, CSIIRW '11.

[3]  Shari Lawrence Pfleeger,et al.  Anatomy of an Intrusion , 2010, IT Professional.

[4]  Ernest McDuffie,et al.  NICE: National Initiative for Cybersecurity Education , 2011, CSIIRW '11.

[5]  Andrew Smith,et al.  Large Scale Delivery of Cisco Networking Academy Program by Blended Distance Learning , 2010, 2010 Sixth International Conference on Networking and Services.

[6]  Corey D. Schou,et al.  A Model for Information Assurance : An Integrated Approach , 2001 .

[7]  Gurdip Kaur,et al.  Intrusion detection system using honeypots and swarm intelligence , 2011, ACAI '11.

[8]  Mario Reyes-Ayala,et al.  Design and implementation of a VLAN , 2010 .

[9]  Julia H. Allen,et al.  Governing for Enterprise Security , 2005 .

[10]  John A. Stankovic,et al.  Security of Distributed, Ubiquitous, and Embedded Computing Platforms , 2009 .

[11]  Raheem Beyah,et al.  Invisible Trojan: an architecture, implementation and detection method , 2002, The 2002 45th Midwest Symposium on Circuits and Systems, 2002. MWSCAS-2002..

[12]  Weiqing Sun,et al.  V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments , 2008, CSET.

[13]  Salah Alabady Design and Implementation of a Network Security Model for Cooperative Network , 2009, Int. Arab. J. e Technol..

[14]  Stefano Zanero Wireless Malware Propagation: A Reality Check , 2009, IEEE Security & Privacy.

[15]  Seiji Munetoh,et al.  Designing a trust chain for a thin client on a live Linux cd , 2007, SAC '07.

[16]  Melanie Bernier,et al.  An overview of cyber attack and computer network operations simulation , 2011, SpringSim.