World Conference on Information Security Education 2009/2011/2013" /> IFIP TC6 Open Digital Library

6.-8. World Conference on Information Security Education 2009/2011/2013

Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers

Ronald C. Dodge Jr., Lynn Futcher

Springer, IFIP Advances in Information and Communication Technology 406, ISBN: 978-3-642-39376-1



Contents

WISE 8, 2013

Back to Basics: Information Security Education for the Youth via Gameplay.

Rayne Reid, Johan Van Niekerk

 1-10

Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders.

Helen Armstrong, Matt Bishop, Colin J. Armstrong

 11-19

Developing Cyber Competition Infrastructure Using the SCRUM Framework.

Heath Novak, Daniel M. Likarish, Erik Moore

 20-31

Security Education: The Challenge beyond the Classroom.

Steven M. Furnell

 32-38

Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security.

William J. Caelli, Vicky Liu, Dennis Longley

 39-47

Information Assurance and Security in the ACM/IEEE CS2013.

Ronald C. Dodge

 48-57

Fostering Content Relevant Information Security Awareness through Browser Extensions.

Marius Potgieter, Craig Marais, Mariana Gerber

 58-67

PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.

Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri, David W. Chadwick

 68-82

The Power of Hands-On Exercises in SCADA Cyber Security Education.

Elena Sitnikova, Ernest Foo, Rayford B. Vaughn

 83-94

"Business Continuity and Information Security Maintenance" Masters' Training Program.

Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov

 95-102

Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis.

Johan Van Niekerk, Kerry-Lynn Thomson, Rayne Reid

 103-112

A Review of IFIP TC 11 WG 11.8 Publications through the Ages.

Lynn Futcher, Louise Yngström

 113-122

WISE 7, 2011

Preparing Our Undergraduates to Enter a Cyber World.

Dino Schweitzer, David Gibson, David Bibighaus, Jeff Boleng

 123-130

How to Secure the Cloud Based Enterprise Information System - - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program.

Yanzhen Qu

 131-139

Robust Programming by Example.

Matt Bishop, Chip Elliott

 140-147

An Approach to Visualising Information Security Knowledge.

Colin J. Armstrong

 148-155

Creating Shareable Security Modules.

Kara L. Nance, Blair Taylor, Ronald Dodge, Brian Hay

 156-163

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula.

Lynn Futcher, Johan Van Niekerk

 164-171

Two Approaches to Information Security Doctoral Research.

Helen Armstrong

 172-179

Towards Information Security Education 3.0 - A Call for Information Security Educational Ontologies.

Johan Van Niekerk, Ryan Goss

 180-187

The Use of Second Life® to Teach Physical Security across Different Teaching Modes.

Vincent Nestler, Erik L. Moore, Kai-Yi Clark Huang, Devshikha Bose

 188-195

An Enterprise Anti-phishing Framework.

Edwin Donald Frauenstein, Rossouw von Solms

 196-203

Teaching Computer Security with a Hands-On Component.

Narayan Murthy

 204-210

The Strengths and Challenges of Analogical Approaches to Computer Security Education.

Matt Bishop, Kara L. Nance

 211-217

WISE 6, 2009

Reaching Today's Information Security Students.

Helen Armstrong, Ronald C. Dodge, Colin J. Armstrong

 218-225

Some "Secure Programming" Exercises for an Introductory Programming Class.

Matt Bishop

 226-232

A SWOT Analysis of Virtual Laboratories for Security Education.

Alan Davidson, Javier de La Puente Martinez, Markus Huber

 233-240

Determinants of Password Security: Some Educational Aspects.

Lynette Drevin, Hennie A. Kruger, Tjaart Steyn

 241-248

Improving Awareness of Social Engineering Attacks.

Aaron Smith, Maria Papadaki, Steven M. Furnell

 249-256

A Risk-Based Approach to Formalise Information Security Requirements for Software Development.

Lynn Futcher, Rossouw von Solms

 257-264

Two Case Studies in Using Chatbots for Security Training.

Stewart Kowalski, Katarina Pavlovska, Mikael Goldstein

 265-272

Information Security Specialist Training on the Basis of ISO/IEC 27002.

Natalia G. Miloslavskaya, Alexander I. Tolstoy

 273-279

Using Bloom's Taxonomy for Information Security Education.

Johan Van Niekerk, Rossouw von Solms

 280-287

Advancing Digital Forensics.

Katrin Franke, Erik Hjelmås, Stephen D. Wolthusen

 288-295