Integrate Hacking Technique into Information Assurance Education

被引:3
|
作者
Yang, Jianhua [1 ]
Wang, Yien [1 ]
Reddington, Thomas [2 ]
机构
[1] Columbus State Univ, TSYS Sch Comp Sci, Columbus, GA 31907 USA
[2] NYU, Polytech Sch Engn, MetroTech Ctr 6, Brooklyn, NY 11201 USA
来源
IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016) | 2016年
关键词
Network mapping; vulnerability scanning; host exploitation; post exploitation; cybersecurity;
D O I
10.1109/WAINA.2016.164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has become a trend that more and more institutions offer offensive techniques in information assurance education. In this paper, up the discussion of network mapping and vulnerability scanning, gaining access to a target via vulnerability exploitation, and maintaining an access to a victim host through HackerDefender rootkit techniques, we propose integrating the hacking techniques into information security education. Five hands-on lab exercises are proposed and the platform iVLab to conduct the labs are also presented.
引用
收藏
页码:381 / 387
页数:7
相关论文
共 50 条
  • [1] Hacking the Nation-State: Security, Information Technology and Policies of Assurance
    Bronk, Chris
    INFORMATION SECURITY JOURNAL, 2008, 17 (03): : 132 - 142
  • [2] Evidence Accrual Technique for Information Assurance
    Stubberud, Stephen C.
    Kramer, Kathleen A.
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 9 - 14
  • [3] Information assurance education - A work in progress
    Bishop, Matt
    Frincke, Deborah A.
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 54 - 57
  • [4] Incorporating hacking projects in computer and information security education: an empirical study
    Alashwali, Eman
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 185 - 203
  • [5] An Interactive Firewall Simulator for Information Assurance Education
    Williams, Kenneth
    Yu, Huiming
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL I, 2011, : 510 - 513
  • [6] ICT education: To integrate or not to integrate?
    Lin, Janet Mei-Chuen
    BRITISH JOURNAL OF EDUCATIONAL TECHNOLOGY, 2008, 39 (06) : 1121 - 1123
  • [7] Why and how to integrate information literacy curriculum in higher education
    Patil, S. B.
    CURRENT SCIENCE, 2014, 107 (01): : 11 - 11
  • [8] Integrating Historical Security Jewels in Information Assurance Education
    McDonald, Jeffrey T.
    Andel, Todd R.
    IEEE SECURITY & PRIVACY, 2012, 10 (06) : 45 - 50
  • [9] Infrastructure Challenges in an Information Assurance Education: An Implementation Case
    Yeo, Liu Hua
    Abualkibash, Munther
    Banfield, James
    Ashur, Suleiman
    2018 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2018, : 583 - 588
  • [10] Hacking, disability, and music education
    Bell, Adam Patrick
    Bonin, David
    Pethrick, Helen
    Antwi-Nsiah, Amanda
    Matterson, Brent
    INTERNATIONAL JOURNAL OF MUSIC EDUCATION, 2020, 38 (04) : 657 - 672