Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Open source centric information security lab development
Crowley E.  Information technology education (Proceedings of the 6th Conference on Information Technology Education, Newark, NJ, Oct 20-22, 2005)57-63.2005.Type:Proceedings
Date Reviewed: Jun 29 2006

This paper discusses how new technologies can be used in a training lab for the field of information security, and how the lab can facilitate learning in the learning modes described in Kolb’s experiential learning model (concrete experience, abstract conceptualization, reflective observation, and active experimentation). While discussion of Kolb’s theory is rather sparse, and correlation to the training methodology is limited, the paper provides good value in its discussion of new technologies.

Crowley provides an excellent overview of new technologies released as open source software, which can be freely distributed, modified, and redistributed under liberal licensing terms. He provides examples of such open source security software, as well as various distributions of Linux, a prominent open source operating system (OS). He then describes how this software can be used to set up an information security training lab economically; in today’s cash-strapped environments, this can be critical. By lowering the marginal cost of setting up existing equipment, educators may be able to fully equip a sizable lab, capable of serving the needs of a typical class. Otherwise, they may have to share a limited number of workstations, provisioned with commercial software, and face a correspondingly higher cost of training per student.

Crowley provides excerpts from his training labs as an appendix. They describe how the lab exercises would invoke Kolb’s theories. It is not clear whether the lab manual is open source, in the spirit of the software used. If so, it would be useful to provide a uniform resource locator (URL) for the reader.

Reviewer:  Lee Imrey Review #: CR132995
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
 
Computer And Information Science Education (K.3.2 )
 
 
Computer Uses in Education (K.3.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy