CREATING SHAREABLE SECURITY MODULES Kara Nance, University of Alaska Fairbanks, Fairbanks, AK, USA Blair Taylor, Towson University, Towson, MD, USA Ronald.

Slides:



Advertisements
Similar presentations
By: Edith Leticia Cerda
Advertisements

When Students Can’t Read…
ESRS Data Policy ESDS role in its successful implementation Kristine Doronenkova,
IT Issues and Support Structures Simulation Education and Complex Technology Based Practice.
DIScovery SciEnce through Computational Thinking (DISSECT) Enrico Pontelli.
“The Great Equalizer: Equality, Equity, and Social Justice” Blane Harding University of Kansas.
Saudi War Course End of Course Capstone Exercise UNCLASSIFIED THIS DOCUMENT IS FOR WARGAME AND EDUCATIONAL USE ONLY AND DOES NOT REFLECT REAL WORLD OPERATIONS.
1 © 2006 Curriculum K-12 Directorate, NSW Department of Education and Training Implementing English K-6 Using the syllabus for consistency of teacher judgement.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
Utilization-focused Assessment in Foundations Curriculum: Examining RCLS 2601: Leisure in Society Clifton E. Watts, PhD Dept. of Recreation & Leisure Studies.
Building Security In: Injecting Security throughout the Undergraduate Computing Security.
TWS Aid for Scorers Information on the Background of TWS.
Using Security Injections to Increase Security and Safety Awareness While Teaching Students to Use Technology Dr. Kara Nance, University of Alaska Fairbanks.
Achitecting an Active Classroom: An Integrative Approach Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University
This work is supported by a National Science Foundation (NSF) collaboration between the Directorates for Education and Human Resources (EHR) and Geosciences.
While it may be difficult to identify the variety of learning styles in your class, some measures can be taken to facilitate and encourage all types of.
Computer Science Department 1 An Open Source Laboratory for Operating Systems Projects * Mark Claypool, David Finkel, Craig Wills Computer Science Department.
System of Environmental-Economic Accounting Advancing the System of Environmental-Economic Accounting Project (AEEA) Research Agenda Mark Eigenraam Senior.
The Erratic Handler and DOROTHY Approach Overview An existing robot handler for the Fluke robots was altered to communicate with Videre’s Erratic robot.
INTEGRATED LEARNING: STAGE 4 (SECONDARY COGS) Principles and process.
Bettina Matysiak PIDP 3104November Introduction  What are “application cards”?  an informal assessment technique which allows instructors to.
10969A Active Directory® Services with Windows Server® Course 10699A
Copyright © 2012 Accenture All Rights Reserved.Copyright © 2012 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are.
VSS supports knowledge management Knowledge based organizations and improving the absorption capacity.
Project-Based Learning ITECH 711 Summer 2007 Trena Noval, Instructor.
Security 1  26 Modules  CS0, CS1, CS2 o Buffer Overflow o Integer Error o Input Validation  Computer Literacy o Phishing o Cryptography.
IB Credit Students earn their IB science course grade based on three written examinations and an independent investigation. This investigation is called.
Providing Access to Your Data Matthew Mayernik National Center for Atmospheric Research Version 1.0 Review Date.
Applied Educational Systems ( or ) Explorations and Foundations in Technology tech center 21 Explorations and Foundations in Technology.
Applying creativity in CS high school education - criteria, teaching example and evaluation Romeike, R. (2007). Applying creativity in CS high school education.
Notebook Integrating Technology Stanley Weiblinger.
MCCWDTA Sharing Blended Learning Strategies Barbara Treacy January 15, 2014 Massachusetts Community Colleges and Workforce Development Transformation Agenda.
Learning Unit Documents and Examples. Learning Units - basic building block of a course For iGETT a Learning Unit consists of –Three parts Instructor.
1 Introduction to Grant Writing Beth Virnig, PhD Haitao Chu, MD, PhD University of Minnesota, School of Public Health December 11, 2013.
Bennett Adelson. Microsoft Solution Center. Independence OH February 4, 2010 BENNETT ADELSON Microsoft® Solution Center.
Accrediting Doctoral Programs into the 21 st Century Dr. Luis G. Pedraja Executive Associate Director MSCHE Tbilisi State University June 2005 Assessing.
 Online Learning Is it the right choice for you?.
Collaborative Learning Environment Preliminary Report - DRAFT December 2008.
 This prepares educators to work in P-12 schools (1)  It provides direction (1)  It is knowledge-based, articulated, shared, coherent, consistent with.
Aug. 9, 2007Gehringer: Improving Course Materials … Through Peer Review … Expertiza: Improving Course Materials and Learning Outcomes through.
CountrySTAT Regional Basic Administrator Training for ECO Member States Friday, October 23, 2015 EVENT Foundations of CountrySTAT E-learning.
Comprehensive Curriculum Now that I have it, what do I do with it? July 2005.
Managing Content with SharePoint 2007 Module 0. Overview  Introduction  About This Course  Course Outline  Using Virtual PC.
Earth System Science Workshop. The Earth System Science curriculum module is part of a larger set of of Earth science modules in the EarthLabs collection.
Science: Unit 3, Key Topic 4http://facultyinitiative.wested.org/1.
MAKING THE SHIFT: FROM CLASSROOM TO ONLINE COURSE DESIGN
Introduction to the Framework: Unit 1, Getting Readyhttp://facultyinitiative.wested.org/1.
Welcome Alabama Course of Study Technology Education Workshop.
Building Security In: Injecting Security throughout the Undergraduate Computing Curriculum PROBLEM STATEMENT  Secure coding is more important than ever.
Building Security In January 2009 Workshop Harry Hochheiser, Building Security In: January 2009 Workshop Harry Hochheiser Towson.
An Evaluation of Professional Development for One-to-One Instruction at Pantego Christian Academy Steven R. Newby Kristi Fairbanks Marilyn Dardenne.
+ Instructional Design Models EDU 560 Fall 2012 Online Module November 13, 2012.
Infusing Tobacco Control Education into the Public Health Curriculum using Web Technology National Conference on Tobacco or Health May STEP UP.
Dee Jacobsen, Ph.D. Assistant Professor, Professional Practice.
Syllabus CS 5 - Computer Literacy 1. Table of Contents General Information Your Instructor Description Outcomes & Objectives 2.
FACULTY EXTERNSHIP OPPORTUNITIES IN DATA SCIENCE AND DATA ANALYTICS Facilitated by: FilAm Software Technology, Clark Freeport Zone Ecuiti, San Francisco,
“Cool” Cybersecurity Modules: No Grading Required!
Cross-Institutional Collaboration for Sustainability
Joslynn Lee – Data Science Educator
System Overview Training on the use of the new countrystat
Performance Development and Review:
System Overview Training on the use of the new countrystat
Progress from Urban Planning Department on Work Supported by CTE
System Overview Training on the use of the new countrystat
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Unit 3 – Physical Development: Key Topic 4
Continuous Assessment Establishing Checkpoints
Physical Therapist Assistant Program School of Science, Health, and Criminal Justice Fall 2016 Assessment Report Curriculum Coordinator: Deborah Molnar.
Curriculum Coordinator: Janet Parcell Mitchell January 2016
Presentation transcript:

CREATING SHAREABLE SECURITY MODULES Kara Nance, University of Alaska Fairbanks, Fairbanks, AK, USA Blair Taylor, Towson University, Towson, MD, USA Ronald Dodge, United States Military Academy, West Point NY, USA Brian Hay, University of Alaska Fairbanks, Fairbanks, AK, USA

Overview 1 Introduction 2 Challenges 3 Framework for Security Modules 4 Examples 5 Future Considerations

Introduction Introductions Background of the paper NSF CCLI grant # and #

Objectives Develop a comprehensive plan for creating sharable security labs Identify challenges of hands-on lab activities Identify unique challenges of security labs Summarize current state of security labs Outline strategies to address challenges Identify dissemination strategies

Challenges Challenges for the instructor in creating a hands-on learning environment Difficult to develop Difficult to disseminate Security labs have additional challenges Distance Learning

Environmental challenges Below is a list of questions instructors may need to address when creating a hands-on computer lab experience: 1. Do all of the students have the same configuration? 2. Do the students all have the same computing platform? 3. Do they all have the same operating system? 4. Do their machines have enough resources to run the lab exercise? 5. How do I know that they all started from the same configuration? 6. If I am not sure that they all started from the same configuration, how can I grade them appropriately? 7. When a student has a problem with the lab exercise, how can I provide help to them? 8. If I need to make a change to the lab exercise or configuration, how do I distribute that to all students? 9. If I am not at my own computer or at the school, how can I work on the lab exercises?

Pedagogical challenges support a meaningful hands-on educational experience for the student providing adequate foundational elements to bring all students to a common level educational content to meet the learning objectives reflective activities to ensure that the learning objectives have been met extension activities to demonstrate how the concepts fit into the big picture. current state of Computer Science (CS) labs ad hoc inadequately address synthetic and analytical thinking

How can we address these challenges? Problem: more instructors recognize the need for incorporating security into the curriculum, many are hindered by the environmental challenges listed above and resource limitations time constraints insufficient security training lack of effective pedagogical materials

Framework for Security Modules Specifically, a framework for shareable security modules should: be broadly applicable across institutions and courses be extendible to meet the needs of diverse audiences be easy to use from a student perspective be easy to identify, access, and implement for instructors encourage active learning facilitate and stimulate development of new modules be largely platform independent

3.1 Security 1) increase faculty awareness of secure coding concepts 2) increase students’ awareness of secure coding issues 3) increase students’ ability to apply secure coding principles and 4) increase the number of security-aware students Modules for CS0, CS1, CS2, Computer Literacy, Web, and database Sample lab

Initial RAVE Deployments  ~1,300 GB RAM, ~80 TB Storage, ~450 Logical Processors  2011 At-Large Regional CCDC ran across this infrastructure

Example – modules in the RAVE environment Environmental challenges 1. configuration 2. computing platform 3. operating system 4. adequate machine resources 5. Starting from the same configuration 6. grading 7. assistance 8. distributing changes 9. Remote access Hand-on Lab done using RAVE Issues 1-6 addressed by RAVE 7. Instructors have remote access, permissions to view and assist student accounts, snapshot capabilities 8. Images are created on demand 9. RAVE environments are remotely accessible 24/7

5 Future Considerations