IT Security Research and Education in Synergy

This paper presents experience from laboratory projects performed by students in Applied Computer Security, a course given at Chalmers University of Technology. From this, we conclude that the comb ...

[1]  T. Olovsson,et al.  On measurement of operational security , 1994, IEEE Aerospace and Electronic Systems Magazine.

[2]  Tomas Olovsson,et al.  On the modelling of preventive security based on a PC network intrusion experiment , 1996, ACISP.

[3]  Tomas Olovsson,et al.  Towards operational measures of computer security: Experimentation and modelling , 1995 .

[4]  Tomas Olovsson,et al.  An empirical model of the security intrusion process , 1996, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96.

[5]  Erland Jonsson,et al.  A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT , 1997 .

[6]  Deborah A. Frincke,et al.  Integrating Security into the Curriculum , 1998, Computer.

[7]  Erland Jonsson,et al.  A taxonomy and overview of information security experiments , 1997, SEC.

[8]  Dan Farmer,et al.  Improving the Security of Your Site by Breaking Into it , 2000 .

[9]  C. Richard Attanasio,et al.  Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..

[10]  Erland Jonsson,et al.  An Analysis of the Security of Windows NT , 1998 .

[11]  Peter D. Goldis Questions and Answers about Tiger Teams , 1989 .

[12]  Ulf Lindqvist,et al.  Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[13]  Tomas Olovsson,et al.  An analysis of a secure system based on trusted components , 1996, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96.

[14]  I. S. Herschberg Make the tigers hunt for you , 1988, Comput. Secur..

[15]  Tomas Olovsson,et al.  Security Evaluation of a PC Network based on Intrusion Experiments , 1996, CCS 1996.

[16]  Tomas Olovsson,et al.  A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..

[17]  Erland Jonsson,et al.  A Map of Security Risks Associated wuth Using COTS , 1998, Computer.

[18]  Carl E. Landwehr,et al.  A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .

[19]  Georgory White,et al.  Security across the curriculum: using computer secu-rity to teach computer science principles , 1997 .

[20]  Eugene H. Spafford,et al.  Are computer hacker break-ins ethical? , 1992, J. Syst. Softw..

[21]  Cynthia E. Irvine,et al.  THE NPS CISR GRADUATE PROGRAM IN INFOSEC: SIX YEARS OF EXPERIENCE , 1997 .