2016
DOI: 10.4018/ijicte.2016010101
|View full text |Cite
|
Sign up to set email alerts
|

Ethical Hacking in Information Security Curricula

Abstract: Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on lab exercises which focus on attacking systems. The paper includes the ethical implications associated with including such labs. The discussion is informed by analyses … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 25 publications
(30 reference statements)
0
5
0
1
Order By: Relevance
“…On the other hand, society must trust formal learning institutions to teach students how to hack ethically. The second option is desirable because training in ethical hacking formalizes the preparation of ethical hackers (Trabelsi and McCoey, 2016, pp. 2–3).…”
Section: Strengths and Limitations Of Ethical Hacking Pedagogymentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, society must trust formal learning institutions to teach students how to hack ethically. The second option is desirable because training in ethical hacking formalizes the preparation of ethical hackers (Trabelsi and McCoey, 2016, pp. 2–3).…”
Section: Strengths and Limitations Of Ethical Hacking Pedagogymentioning
confidence: 99%
“…Consequently, the current defenses are only effective in detecting intrusion days, weeks or even months after the system has suffered extensive damage. For example, investigators detected and fixed the cyberattack at Target and Home Depot after more than six months (Trabelsi and McCoey, 2016, pp. 4–5).…”
Section: Strengths and Limitations Of Ethical Hacking Pedagogymentioning
confidence: 99%
“…Pengujian yang dilakukan pada server fisik meliputi pengujian vulnerability dan penetration testing. Tujuan pengujian adalahmenentukan dan mengetahui macam-macam serangan yangmungkin dilakukan pada sistem serta akibat yang bisa terjadikarena adanya kelemahan keamanan pada sistem komputeratau jaringan yang dimiliki [6]. Laboratorium virtual akan dikembangkan untuk melakukan simulasi pengujian vulnerability dan penetration testing pada lingkungan virtualisasi.…”
Section: Pendahuluanunclassified
“…None of above designs, however, present a suite of labs for an EH course. There are also rich studies that address various aspects of EH (e.g., student red-teaming experiences [5], penetration testing architecture [7], EH certification course analysis [16], legal and ethical issues with EH [14,18,21]), but they do not explicitly address the choices and organization of topics in an EH course (i.e., the second challenge).…”
Section: Introductionmentioning
confidence: 99%