메뉴 건너뛰기




Volumn , Issue , 2010, Pages 21-26

Case studies for teaching physical security and security policy

Author keywords

Case study; Information security education; Physical security; Security policy

Indexed keywords

ACTIVE LEARNING; BLOOM'S TAXONOMY; CASE DESCRIPTION; CASE STUDY; INFORMATION SECURITY; INFORMATION SECURITY EDUCATION; LEARNING OBJECTIVES; PHYSICAL SECURITY; SECURITY POLICY; STUDENT FEEDBACK; TEACHING METHODS;

EID: 79952497230     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1940941.1940947     Document Type: Conference Paper
Times cited : (4)

References (12)
  • 2
    • 77955957831 scopus 로고    scopus 로고
    • available at, accessed on June 1, 2010
    • Bloom's Taxonomy, available at: http://www.officeport.com/edu/blooms.htm, accessed on June 1, 2010.
    • Bloom's Taxonomy
  • 3
    • 79952513169 scopus 로고    scopus 로고
    • available at, accessed on June 1, 2010
    • Fink, L. Dee. What is Significant Learning? available at: www.wcu.edu/WebFiles/PDFs/facultycenter-SignificantLearning.pdf, accessed on June 1, 2010.
    • What Is Significant Learning?
    • Dee, F.L.1
  • 5
    • 79952515884 scopus 로고    scopus 로고
    • available at, accessed on June 1, 2010
    • SANS Infosec Reading Room - Physical Security, available at: http://www.sans.org/reading-room/whitepapers/physcial/, accessed on June 1, 2010.
    • SANS Infosec Reading Room - Physical Security
  • 6
    • 79952498163 scopus 로고    scopus 로고
    • How Cisco IT controls building security over the enterprise WAN
    • available at, accessed on June 1, 2010
    • How Cisco IT controls building security over the enterprise WAN, Cisco IT case study: Enterprise network building security, available at: www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/ Cisco-IT-Case-Study-Enterprise-Access-Control.pdf, accessed on June 1, 2010.
    • Cisco IT Case Study: Enterprise Network Building Security
  • 7
    • 79952496582 scopus 로고    scopus 로고
    • National Institute of Standards and Technology Special Publication 800-41, available at, accessed on June 1, 2010
    • Scarfone, K. and Hoffman, P. Guidelines on firewalls and firewall policies, National Institute of Standards and Technology Special Publication 800-41, available at: http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/ sp800-41-rev1.pdf, accessed on June 1, 2010.
    • Guidelines on Firewalls and Firewall Policies
    • Scarfone, K.1    Hoffman, P.2
  • 9
    • 79952521950 scopus 로고    scopus 로고
    • November, available at, accessed on February, 10, 2010
    • Security Policy: Griffith University security policy. November2002, available at: www.griffith.edu.au/ins/org/policies/content01.html, accessed on February, 10, 2010.
    • (2002) Security Policy: Griffith University Security Policy
  • 10
    • 79952513605 scopus 로고    scopus 로고
    • available at, accessed on June 1, 2010
    • Security Policy: Sample Backup policy, available at: http://www. comptechdoc.org/independent/security/policies/backup-policy.html, accessed on June 1, 2010.
    • Security Policy: Sample Backup Policy
  • 11
    • 79952511749 scopus 로고    scopus 로고
    • available at, accessed on June 1, 2010
    • SANS Reading room. Sample Communication Policy, available at: www.sans.org/resources/policies/Communications-Equipment2.pdf, accessed on June 1, 2010.
    • SANS Reading Room. Sample Communication Policy


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.