Download presentation
Presentation is loading. Please wait.
Published byShanon Murphy Modified over 9 years ago
1
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College beaumoc@hope.ac.uk
2
http://www.hope.ac.uk/ Agenda What is PBL? Why use PBL? How did we use it? Example Issues Success Questions, comments … insults?
3
http://www.hope.ac.uk/ Problem-Based Learning (PBL) In teams, students are given a problem they don’t know how to solve. & they devise a strategy to solve it. In teams, students are given a problem they don’t know how to solve. & they devise a strategy to solve it.
4
http://www.hope.ac.uk/ Why PBL? Starts where they are Learning is relevant & effective They learn what they need to solve the problem Develop skills: problem solving, critical analysis, team work, reasoning, reflection, manage uncertainty Employability Motivational
5
http://www.hope.ac.uk/ PBL and security PBL works best with ill-defined (messy) real-world problems that have a number of alternative solutions and are open ended. Security provides a rich environment for such scenarios
6
http://www.hope.ac.uk/ How? - Example Systems & network Security module 15 credit final year undergraduate module 2 hours per week PBL tutorial / Lab session 4/5 weeks in lab Teams of 5 students Coursework + Seen exam Prior knowledge – LAN module
7
http://www.hope.ac.uk/ Learning Outcomes Critically and systematically analyse the exposure to security threats of a networked computer system Formulate a reasoned and appropriate plan to address the risks in a networked computer system Use appropriate tools to implement aspects of security in a networked computer system
8
http://www.hope.ac.uk/ Key skills assessed Problem-solving Communication Working with others Improving own learning and performance
9
http://www.hope.ac.uk/ PBL Scenario Ace Training Ltd – IT training company with head office Liverpool, Training centre: Manchester Small 100BaseT LAN in each office (one server) + 802.11g in Liverpool for Laptops. Restricted Internet access (mgt only). No internal email
10
http://www.hope.ac.uk/ PBL Scenario Liverpool office: Sales dept (11) use Sage Act! and MS Office. Accounts Dept use Sage Line 50 Personnel data also stored. Marketing dept use QuarkXPress
11
http://www.hope.ac.uk/ PBL Scenario The board of directors has now decided to extend the network with the following requirements: Email and internet access for all staff in Liverpool. Host its own Web site in Liverpool (with a view to ultimately incorporating some form of e-commerce & on-line course booking). Enable the Training Centre manager and administrators to access various company data on the Liverpool server
12
http://www.hope.ac.uk/ PBL Scenario The board are aware that they do not have the expertise to develop an ISMS and have called you in to help them. Your terms of reference are: To perform a systematic risk assessment of the security threats to the company assets, and provide recommendations for risk treatment. To design and present a proposal for a secure network architecture to meet the present requirements and construct a demonstration network to show proof of concept
13
http://www.hope.ac.uk/ Expected Clarification Issues Eg: Company Assets Policies Email requirements Availability requirements Network details (eg resilience features) Laptop usage
14
http://www.hope.ac.uk/ Expected Learning Issues What should an ISMS consist of? Confidentiality, Availability, Integrity BS 7799 Threats and Vulnerabilities Risk Assessment & treatment Legal Issues
15
http://www.hope.ac.uk/ Expected Learning Issues IP subnetting and NAT Security architecture/ technology Firewalls, DMZ, IDS Encryption Authentication and Authorization Secure transmission – VPN / SSL
16
http://www.hope.ac.uk/ Expected Learning Issues Configuring Software for demonstration CheckPoint Win2k Routing IIS
17
http://www.hope.ac.uk/ Resources Set book Panko (2004) Corporate Computer & Network Security BS7799 parts 1 & 2 Internet resources Lab session on routing and CheckPoint configuration Seminar on subnetting
18
http://www.hope.ac.uk/ Deliverables (assessed) Reports Risk assessment Proposed architecture / technologies used with justification and consideration of alternatives. Demonstration network (5 PCs) Individual research reports Team Presentation
19
http://www.hope.ac.uk/ Lab resources Each team has 5 hard disks/ caddies + 5 PCs with several NICs in each, connected to patch panel. Team has two switches. Hard disks pre-installed with Win2k Server, one has CheckPoint firewall.
20
Example solution for similar scenario - Firewall rules also provided
21
http://www.hope.ac.uk/ Typical team lab setup
22
http://www.hope.ac.uk/ Issues Level of detail Can be superficial - need to question thoroughly Lab issues – configuration problems with routers/ CheckPoint
23
http://www.hope.ac.uk/ Successes Team work Motivation Research-based solutions Variation in solutions
24
http://www.hope.ac.uk/ The Secret of success?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.