메뉴 건너뛰기




Volumn , Issue , 2007, Pages 44-48

Is attack better than defense?: Teaching information security the right way

Author keywords

Computer forensics; Empirical measurement; Offensive techniques; Security education; Security lab; Summerschool

Indexed keywords

COMPUTER CRIME; CURRICULA; ENGINEERING EDUCATION; RESEARCH LABORATORIES; TEACHING;

EID: 34748843427     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1231047.1231056     Document Type: Conference Paper
Times cited : (30)

References (23)
  • 3
    • 32444441216 scopus 로고    scopus 로고
    • Guest Editors' introduction: Why attacking systems is a good idea
    • July Aug
    • I. Arce and G. McGraw. Guest Editors' introduction: Why attacking systems is a good idea. IEEE Security & Privacy, 2(4): 17-19, July Aug. 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 17-19
    • Arce, I.1    McGraw, G.2
  • 4
    • 23344451064 scopus 로고    scopus 로고
    • Busting the ghost in the machine
    • Aug
    • K. P. Arnett and M. B. Schmidt. Busting the ghost in the machine. Communications of the ACM, 48(8):92-95, Aug. 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 92-95
    • Arnett, K.P.1    Schmidt, M.B.2
  • 6
    • 14544292121 scopus 로고    scopus 로고
    • Why computer scientists should attend hacker conferences
    • Mar
    • G. Conti. Why computer scientists should attend hacker conferences. Communications of the ACM, 48(3):23-24, Mar. 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.3 , pp. 23-24
    • Conti, G.1
  • 7
    • 33745875956 scopus 로고    scopus 로고
    • Hacking and innovation (guest editor's introduction)
    • June
    • G. Conti. Hacking and innovation (guest editor's introduction). Communications of the ACM, June 2006.
    • (2006) Communications of the ACM
    • Conti, G.1
  • 8
    • 34748907729 scopus 로고    scopus 로고
    • Digital Evolution. Homepage Digital Evolution. http://www.dievo.org/. Accessed. March 2006.
    • Digital Evolution. Homepage "Digital Evolution". http://www.dievo.org/. Accessed. March 2006.
  • 10
    • 0343302299 scopus 로고
    • Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix, 3
    • Dec
    • D. Farmer and W. Venema. Improving the security of your site by breaking into it. Usenet Posting to comp.security.unix, 3. Dec. 1993.
    • (1993)
    • Farmer, D.1    Venema, W.2
  • 12
    • 34748855415 scopus 로고    scopus 로고
    • An Offensive Approach to teaching Information Security: "Aachen Summer School Applied IT Security
    • Technical Report AIB-2005-02, RWTH Aachen, Jan
    • M. Dornseif, F. C. Gärtner, T. Holz, and M. Mink. An Offensive Approach to teaching Information Security: "Aachen Summer School Applied IT Security". Technical Report AIB-2005-02, RWTH Aachen, Jan. 2005.
    • (2005)
    • Dornseif, M.1    Gärtner, F.C.2    Holz, T.3    Mink, M.4
  • 13
    • 34748826675 scopus 로고    scopus 로고
    • Accessed April
    • Ghetto Hackers. Homepage "Root-Fu". http://www.ghettohackers. net/rootfu/. Accessed April 2006.
    • (2006) Root-Fu
  • 14
    • 34748896486 scopus 로고    scopus 로고
    • Hack this page. Homepage Hack this page. http://www.hackthi. spage.tk/. Accessed May 2006.
    • Hack this page. Homepage "Hack this page". http://www.hackthi. spage.tk/. Accessed May 2006.
  • 16
    • 25844446848 scopus 로고    scopus 로고
    • Inside risks: The big picture
    • Sept
    • P. G. Neumann. Inside risks: the big picture. Communications of the ACM, 47(9): 112, Sept. 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.9 , pp. 112
    • Neumann, P.G.1
  • 19
    • 27844434598 scopus 로고    scopus 로고
    • Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universitäten
    • June
    • M. Schumacher, M.-L. Moschgath, and U. Roedig. Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universitäten. Informatik Spektrum, 6(23), June 2000.
    • (2000) Informatik Spektrum , vol.6 , Issue.23
    • Schumacher, M.1    Moschgath, M.-L.2    Roedig, U.3
  • 20
    • 4243150699 scopus 로고    scopus 로고
    • Who will rob you on the digital highway?
    • May
    • T. Slewe and M. Hoogenboom. Who will rob you on the digital highway? Communications of the ACM, 47(5):56-60, May 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.5 , pp. 56-60
    • Slewe, T.1    Hoogenboom, M.2
  • 22
    • 84904308086 scopus 로고    scopus 로고
    • G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, 253 of IFIP Conference Proceedings, pages 3-18. Kluwer, 2003.
    • G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, pages 3-18. Kluwer, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.