Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411.2004.Type:Proceedings
Date Reviewed: May 19 2004

This short paper addresses the critical issue of teaching computer security in college and university settings. It addresses the issue from the perspective of a very small college, with only six faculty members, and both an applied computer science program and an information technology program, serving about 120 students. It describes, in some detail, courses on system administration and computer security.

The description of the system administration course presents overviews of a transition from Windows to Linux, and lays out the course’s 16-week teaching schedule. This course is a hands-on lab course on securing Linux, and uses Maximum Linux security [1] as its text.

The computer security course is a mixed lecture and laboratory course, and the authors describe its evolution from the first to the second type of offering. Assignments are covered in substantial detail, including the effectiveness of various assignments and student feedback.

More than anything else, this paper is an exercise in lessons learned in trying to introduce computer security into a small college setting, with limited staff capability. The authors’ effort is commendable, but falls far short of what is really needed. They indicate that they integrated some security topics into existing courses, but I was disappointed that they did not describe these topics, or how they arrived at the decision to include certain materials in the existing classes, and allocate others to new classes.

This paper is a must-read for teachers at small colleges, and useful for anyone with an interest in teaching computer security. Teachers working in robust programs will be disappointed, but the beginners will appreciate the effort.

Reviewer:  Robert E. Mahan Review #: CR129645 (0501-0140)
1) Ray, J. Maximum Linux security (2nd ed.). Sams, Carmel, IN, 2001.
Bookmark and Share
  Reviewer Selected
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Unauthorized Access (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Black hat: the criminals and misfits on the edge of today”s technology
Biggs J., APress, LP, Berkeley, CA, 2004.  158, Type: Book (9781590593790)
Jul 27 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy