2008 38th Annual Frontiers in Education Conference 2008
DOI: 10.1109/fie.2008.4720283
|View full text |Cite
|
Sign up to set email alerts
|

Counter hack: Creating a context for a cyber forensics course

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2011
2011

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…In practical assignments students use the same methods and tools that hackers with malicious intent use to gain access to information. The usage of practical assignments in computer security is performed as part of many computer security courses, such as in forensics [5], in education on spam [6] and in social engineering [7]. We believe that students need to understand the hacking mentality and see how an adversary would attack also in the physical and the social domain of information security.…”
Section: Figure 1: Computer Security In Contextmentioning
confidence: 99%
See 1 more Smart Citation
“…In practical assignments students use the same methods and tools that hackers with malicious intent use to gain access to information. The usage of practical assignments in computer security is performed as part of many computer security courses, such as in forensics [5], in education on spam [6] and in social engineering [7]. We believe that students need to understand the hacking mentality and see how an adversary would attack also in the physical and the social domain of information security.…”
Section: Figure 1: Computer Security In Contextmentioning
confidence: 99%
“…The second and third exercise can be considered as a reproduction of exercises reported by other authors [5,11,12]. …”
Section: Design Of the Practical Assignmentmentioning
confidence: 99%
“…The second and third exercise can be considered as a reproduction of exercises reported by other authors [37,68,13]. …”
Section: Online Attacksmentioning
confidence: 99%
“…In practical assignments students use the same methods and tools that hackers with malicious intent use to gain access to information. The usage of practical assignments in computer security is performed as part of many computer security courses, such as in forensics [37], in education on spam [95] and in social engineering [42]. We believe that students need to understand the hacking mentality and see how an adversary would attack also in the physical and the social domain of information security.…”
Section: Introductionmentioning
confidence: 99%