Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA

Contributing Authors. Preface. Acknowledgments. Cyber Security as an Emergent Infrastructure D.E. Denning. Teaching Network Security Through Live Exercises G. Vigna. Information Warfare in the Trenches S.D. Lathrop, G.J. Conti, D.J. Ragsdale. Changes in the Profile of Security Managers T. Virtanen. A Tutoring System for IT Security Ji Hu, M. Schmitt, C. Willems, C. Meinel. Design of a Laboratory for Information Security Education V. Anantapadmanabhan, P. Frankl, N. Memon, G. Naumovich. Integrating Information Security and Intelligence Courses W. Hutchinson. Internet Security Management H.L. Armstrong. Information Security Fundamentals P. Oscarson. Australia's Agenda for E-Security Education and Research M.J. Warren. Is Security a Great Principle of Computing? P.J. Denning. IT Security Readiness in Developing Countries R. Casmir, L. Yngstroem. A Program for Education in Certification and Accreditation C.W. Rasmussen, C.E. Irvine, G.W. Dinolt, T.E. Levin, K.L. Burke. Mastering Computer Forensics C.J. Armstrong. Assembling Competitive Intelligence Using Classroom Scenarios H.L. Armstrong, J. Davey. Panel: Teaching Undergraduate Information Assurance M. Bishop. Panel: Teaching Undergraduate Information Assurance R. Vaughn. Panel: Teaching Undergraduate Information Assurance in Russia A. Maljuk, N. Miloslavskaia, A. Tolstoi. Outcomes-based Assessment as an Assurance Education Tool S. Older, Shiu-Kai Chin. Evaluation Theory and Practice as Applied to Security Education M.J. Dark. Ten Years of Information Security Masters Programmes C. Ciechanowicz, K.M. Martin, F.C. Piper, M.J.B. Robshaw. Network Security Scientific and Research Laboratory N. Miloslavskaia, A. Tolstoi. A Comprehensive Undergraduate InformationAssurance Program G. Conti, J. Hill, S. Lathrop, K. Alford, D. Ragsdale. Training the Cyber Warrior J.D. Fulp. Security Education for Times of Netwar and Peace J. Dockal. Improving Security Awareness Through Computer-based Training S.M. Furnell, A.G. Warren, P.S. Dowland. Identification and Integration of Information Security Topics J. Brown. A Dedicated Undergraduate Track in Computer Security Education S. Azadegan, M. Lavine, M. O'Leary, A. Wijesinha, M. Zimand. Index of Keywords.

[1]  Neil C. Rowe,et al.  An intelligent tutor for intrusion detection on computer systems , 1998, Comput. Educ..

[2]  H. V. Jagadish,et al.  Information warfare and security , 1998, SGMD.

[3]  Steven Furnell,et al.  A prototype tool for information security awareness and training , 2002 .

[4]  Gail A. Herndon The chronicle of higher education , 1977 .

[5]  Daniel Ragsdale,et al.  Training for Information Assurance , 2002, Computer.

[6]  Herman T. Tavani,et al.  Readings in Cyberethics , 2001 .

[7]  Steve A. Schneider,et al.  Concurrent and Real-time Systems: The CSP Approach , 1999 .

[8]  Matt Bishop,et al.  Academia and Education in Information Security: Four Years Later , 2000 .

[9]  Jeff Dike,et al.  A user-mode port of the Linux kernel , 2000, Annual Linux Showcase & Conference.

[10]  Stafford Beer,et al.  The Viable System Model : its provenance , development , methodology and pathology * Stafford Beer = President of the World Organization for Systems and Cybernetics , 2000 .

[11]  Prabhaker Mateti A laboratory-based course on internet security , 2003, SIGCSE.

[12]  Thomas Peltier,et al.  Information Technology: Code of Practice for Information Security Management , 2001 .

[13]  Dimitris Gritzalis,et al.  Action learning in practice: Pilot delivery of an INFOSEC University laboratory course , 2001 .

[14]  James L. Schaub,et al.  COMPUTER SECURITY EDUCATION , 1995 .

[15]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[16]  Gerald L. Kovacich,et al.  Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2 , 2002, Inf. Secur. J. A Glob. Perspect..

[17]  William W. Lee,et al.  The Computer Based Training Handbook : Assessment, Design, Development, Evaluation , 1995 .

[18]  Tom Routen,et al.  Intelligent Tutoring Systems , 1996, Lecture Notes in Computer Science.

[19]  John R. Surdu,et al.  The IWAR range: a laboratory for undergraduate information assurance education , 2001 .

[21]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[22]  Ken Frazer,et al.  Building secure software: how to avoid security problems the right way , 2002, SOEN.

[23]  Cynthia E. Irvine The Reference Monitor Concept as a Unifying Principle in Computer Security Education , 1999 .

[24]  Louise Yngström,et al.  A systemic-holistic approach to academic programmes in IT security , 1996 .

[25]  C. Achilles,et al.  Evaluation: A Systematic Approach , 1980 .

[26]  Udo W. Pooch,et al.  Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.

[27]  Martha W. Evens,et al.  Web-Based ITS for Training System Managers on the Computer Intrusion , 2002, Intelligent Tutoring Systems.

[28]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[29]  Martín Abadi,et al.  Authentication in the Taos operating system , 1994, TOCS.

[30]  Paul Iarocci Logging in the , 2005 .

[31]  D. Richard Kuhn,et al.  A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.

[32]  C. Tschernitz,et al.  Competitive Intelligence , 2001 .

[33]  Robin Milner,et al.  A Calculus of Communicating Systems , 1980, Lecture Notes in Computer Science.

[34]  Benjamin S. Bloom,et al.  Taxonomy of Educational Objectives: The Classification of Educational Goals. , 1957 .

[35]  Rance Cleaveland,et al.  The concurrency workbench: a semantics-based tool for the verification of concurrent systems , 1993, TOPL.

[36]  Jon Howell,et al.  A Formal Semantics for SPKI , 2000, ESORICS.

[37]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[38]  Erland Jonsson,et al.  IT Security Research and Education in Synergy , 1999 .

[39]  Martín Abadi,et al.  A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.

[40]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[41]  Thomas A. Carey The WarRoom Guide to Competitive Intelligence , 1999 .

[42]  Robert M. Diamond,et al.  Designing & Assessing Courses & Curricula: A Practical Guide , 1998 .

[43]  Clifton Smith,et al.  Core curriculum in security science , 2001 .

[44]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[45]  Richard Hackworth,et al.  OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.

[46]  Jiannong Cao,et al.  Virtual Programming Lab for Online Distance Learning , 2002, ICWL.

[47]  Matthew Warren,et al.  Principles of information warfare , 2001 .

[48]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .