首页 > 最新文献

Journal of Security Education最新文献

英文 中文
Agent-Based Simulations for Disaster Decision Support 基于agent的灾难决策支持模拟
Pub Date : 2006-10-20 DOI: 10.1300/J460v01n04_15
L. Yin
Abstract Agent-based simulation is a potentially useful tool to examine and understand how observed social entities respond efficiently to interventions for defense against sudden and destructive events. Agents can be coded as objects with properties (e.g., age, gender) to mimic the behavior patterns of individuals during an emergency. In this paper, I discuss the potential application of agent-based models on decision making related to evacuation plan. Specifically, I focus on using such models to learn how at-risk populations interact with each other and respond to interventions during evacuation, so that scenarios can be built to study how interventions might optimize evacuation process.
基于智能体的模拟是一种潜在的有用工具,用于检查和理解观察到的社会实体如何有效地响应防御突发和破坏性事件的干预措施。代理可以被编码为具有属性(例如,年龄、性别)的对象,以模仿紧急情况下个人的行为模式。在本文中,我讨论了基于智能体的模型在疏散计划相关决策中的潜在应用。具体来说,我专注于使用这些模型来了解高危人群在疏散过程中如何相互作用以及对干预措施的反应,以便建立场景来研究干预措施如何优化疏散过程。
{"title":"Agent-Based Simulations for Disaster Decision Support","authors":"L. Yin","doi":"10.1300/J460v01n04_15","DOIUrl":"https://doi.org/10.1300/J460v01n04_15","url":null,"abstract":"Abstract Agent-based simulation is a potentially useful tool to examine and understand how observed social entities respond efficiently to interventions for defense against sudden and destructive events. Agents can be coded as objects with properties (e.g., age, gender) to mimic the behavior patterns of individuals during an emergency. In this paper, I discuss the potential application of agent-based models on decision making related to evacuation plan. Specifically, I focus on using such models to learn how at-risk populations interact with each other and respond to interventions during evacuation, so that scenarios can be built to study how interventions might optimize evacuation process.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114147959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Planning for Community Health Emergencies 社区突发卫生事件规划
Pub Date : 2006-10-20 DOI: 10.1300/J460v01n04_12
E. Sternberg
Abstract After initially defining “community health-emergency planning,” this paper proposes research directions that would contribute to the security of healthcare systems, by mitigating disastrous emergencies and by preparing for them. The topics covered are: (1) Hazard-resistant healthcare facilities, (2) biodetection and syndrome surveillance, (3) diagnosis and investigation, (4) stockpiling, (5) disease containment, (6) patient movement, (7) mass decontamination and prophylaxis, (8) mass care, and (9) information and communication.
在初步定义了“社区卫生应急计划”之后,本文提出了通过减轻灾难性突发事件并为此做好准备来促进医疗系统安全的研究方向。涵盖的主题有:(1)抗危险的卫生保健设施,(2)生物检测和综合征监测,(3)诊断和调查,(4)储存,(5)疾病控制,(6)患者移动,(7)大规模消毒和预防,(8)大规模护理,(9)信息和交流。
{"title":"Planning for Community Health Emergencies","authors":"E. Sternberg","doi":"10.1300/J460v01n04_12","DOIUrl":"https://doi.org/10.1300/J460v01n04_12","url":null,"abstract":"Abstract After initially defining “community health-emergency planning,” this paper proposes research directions that would contribute to the security of healthcare systems, by mitigating disastrous emergencies and by preparing for them. The topics covered are: (1) Hazard-resistant healthcare facilities, (2) biodetection and syndrome surveillance, (3) diagnosis and investigation, (4) stockpiling, (5) disease containment, (6) patient movement, (7) mass decontamination and prophylaxis, (8) mass care, and (9) information and communication.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the Resilience of Communities Against Extreme Events from an Earthquake Engineering Perspective 从地震工程的角度增强社区对极端事件的应变能力
Pub Date : 2006-10-20 DOI: 10.1300/J460v01n04_14
M. Bruneau
Abstract This paper outlines a general disaster resilience concept that has been developed in the field of earthquake engineering but that is applicable to any type of disaster. Consistently, a few examples are presented of technologies that could be expanded to be applicable in a multiple hazards perspective, either for preparedness, mitigation, or response and recovery. It is also emphasized that integrated and coordinated multidisciplinary research teams are key to developing the new knowledge needed to achieve significant advances toward the goal of more resilient communities.
摘要本文概述了在地震工程领域发展起来的一个通用的灾害恢复概念,它适用于任何类型的灾害。一致地,提出了一些技术的例子,这些技术可以扩展到适用于多种危害的角度,无论是准备、减轻还是应对和恢复。报告还强调,综合和协调的多学科研究团队是开发新知识的关键,这些知识是在实现更有弹性社区目标方面取得重大进展所需的。
{"title":"Enhancing the Resilience of Communities Against Extreme Events from an Earthquake Engineering Perspective","authors":"M. Bruneau","doi":"10.1300/J460v01n04_14","DOIUrl":"https://doi.org/10.1300/J460v01n04_14","url":null,"abstract":"Abstract This paper outlines a general disaster resilience concept that has been developed in the field of earthquake engineering but that is applicable to any type of disaster. Consistently, a few examples are presented of technologies that could be expanded to be applicable in a multiple hazards perspective, either for preparedness, mitigation, or response and recovery. It is also emphasized that integrated and coordinated multidisciplinary research teams are key to developing the new knowledge needed to achieve significant advances toward the goal of more resilient communities.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Policing Global Challenges 监管全球挑战
Pub Date : 2006-10-20 DOI: 10.1300/J460v01n04_08
Korni Swaroop Kumar, Mahesh K. Nalla
Abstract The concept of global crime and policing is an important topic and has assumed new meaning since the terrorist events such as the attacks in New York City, Madrid, and more recently in London. The focus of this current research is an exploratory and descriptive analysis of the general elements of international police cooperation. The emphasis will be on regional, national, and agency wide cooperative efforts and challenges to such endeavors. This analysis attempts to help researchers and practitioners understand the current efforts of international police cooperation in some regions of the world, as well as the best ways in which lessons learned could strengthen global police cooperation.
全球犯罪和警务的概念是一个重要的话题,自纽约、马德里和最近的伦敦恐怖袭击事件以来,这一概念被赋予了新的意义。目前这项研究的重点是对国际警察合作的一般要素进行探索性和描述性的分析。重点将放在区域、国家和机构范围内的合作努力以及这些努力面临的挑战上。这一分析试图帮助研究人员和从业人员了解目前在世界某些区域进行国际警察合作的努力,以及吸取的经验教训可以加强全球警察合作的最佳方式。
{"title":"Policing Global Challenges","authors":"Korni Swaroop Kumar, Mahesh K. Nalla","doi":"10.1300/J460v01n04_08","DOIUrl":"https://doi.org/10.1300/J460v01n04_08","url":null,"abstract":"Abstract The concept of global crime and policing is an important topic and has assumed new meaning since the terrorist events such as the attacks in New York City, Madrid, and more recently in London. The focus of this current research is an exploratory and descriptive analysis of the general elements of international police cooperation. The emphasis will be on regional, national, and agency wide cooperative efforts and challenges to such endeavors. This analysis attempts to help researchers and practitioners understand the current efforts of international police cooperation in some regions of the world, as well as the best ways in which lessons learned could strengthen global police cooperation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portfolio Theory for Regional Disaster Analysis and Policy 区域灾害分析与政策的投资组合理论
Pub Date : 2006-10-20 DOI: 10.1300/J460v01n04_02
S. Cole
Abstract My paper describes a portfolio theoretic framework for exploring the causes and consequences of major disruptions on regions and communities. The approach can be related to theories of financial portfolio management, optimal insurance, moral hazard, and ambiguous uncertainty, and the empirical literature on sustainable livelihoods, robust engineering, and disaster management. The present paper explains how Markowitz (1959) portfolio management theory may be adapted to the situation of a small region facing periodic and irregular disruptions in local and export markets, and used to select a portfolio of disaster mitigating strategies that maximize societal utility. This theory is implemented empirically using a computer simulation model. Model simulations show how the potential for major disruptions varies with economic policy, increasing rapidly with the risk-propensity of policy-makers or policies that increase the likelihood of concatenated events. Moreover, strategies that reduce ambiguity or protect critical elements in cascading disasters provide far more robust policy.
我的论文描述了一个投资组合理论框架,用于探索对地区和社区的重大破坏的原因和后果。该方法可以与金融投资组合管理、最优保险、道德风险和模糊不确定性理论以及可持续生计、稳健工程和灾害管理方面的实证文献相关。本文解释了马科维茨(1959)的投资组合管理理论如何适用于面临本地和出口市场周期性和不规则中断的小区域的情况,并用于选择使社会效用最大化的减轻灾害策略的投资组合。该理论通过计算机仿真模型进行了实证验证。模型模拟显示,重大破坏的可能性如何随着经济政策的变化而变化,随着决策者的风险倾向或增加串联事件可能性的政策的增加而迅速增加。此外,减少模糊性或保护级联灾难中的关键元素的策略提供了更强大的策略。
{"title":"Portfolio Theory for Regional Disaster Analysis and Policy","authors":"S. Cole","doi":"10.1300/J460v01n04_02","DOIUrl":"https://doi.org/10.1300/J460v01n04_02","url":null,"abstract":"Abstract My paper describes a portfolio theoretic framework for exploring the causes and consequences of major disruptions on regions and communities. The approach can be related to theories of financial portfolio management, optimal insurance, moral hazard, and ambiguous uncertainty, and the empirical literature on sustainable livelihoods, robust engineering, and disaster management. The present paper explains how Markowitz (1959) portfolio management theory may be adapted to the situation of a small region facing periodic and irregular disruptions in local and export markets, and used to select a portfolio of disaster mitigating strategies that maximize societal utility. This theory is implemented empirically using a computer simulation model. Model simulations show how the potential for major disruptions varies with economic policy, increasing rapidly with the risk-propensity of policy-makers or policies that increase the likelihood of concatenated events. Moreover, strategies that reduce ambiguity or protect critical elements in cascading disasters provide far more robust policy.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Qualitative Analysis of Computer Security Education and Training in the United States 美国计算机安全教育与培训的定性分析
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_07
M. Basham, Angel L. Rosado
Abstract Ever since September 11th there has been an almost constant bombardment of articles written about the need for every aspect of security. The news stories are in newspapers, magazines, and on television. You just cannot pick up any medium and not find one. The resulting President's Critical Infrastructure Committee on homeland security has determined computer security education and training to be paramount for the security of America. This paper examines relevant literature about computer security education and training, examines similar programs at other community colleges, and proposes the creation of two certificate training programs, in criminal justice and computer protection. The authors then argue that these two programs are unlike any other program in the country. These two certificates present a two-headed attack to the problem in ways never approached by other community colleges, colleges, or universities. The paper then proposes logistical information and value added impact outcomes for implementing these certificates at St. Petersburg College. The authors conclude by looking at the future for computer security.
自9月11日以来,有关安全各方面需求的文章几乎不断涌现。新闻故事出现在报纸、杂志和电视上。你不可能拿起任何媒介却找不到。由此产生的总统国土安全关键基础设施委员会已经确定,计算机安全教育和培训对美国的安全至关重要。本文考察了有关计算机安全教育和培训的相关文献,考察了其他社区学院的类似项目,并建议创建刑事司法和计算机保护两个证书培训项目。作者接着争辩说,这两个项目不同于该国的任何其他项目。这两个证书以其他社区学院、学院或大学从未采用过的方式,对问题进行了双管齐下的攻击。然后,论文提出了在圣彼得堡学院实施这些证书的后勤信息和增值影响结果。作者最后展望了计算机安全的未来。
{"title":"A Qualitative Analysis of Computer Security Education and Training in the United States","authors":"M. Basham, Angel L. Rosado","doi":"10.1300/J460v01n02_07","DOIUrl":"https://doi.org/10.1300/J460v01n02_07","url":null,"abstract":"Abstract Ever since September 11th there has been an almost constant bombardment of articles written about the need for every aspect of security. The news stories are in newspapers, magazines, and on television. You just cannot pick up any medium and not find one. The resulting President's Critical Infrastructure Committee on homeland security has determined computer security education and training to be paramount for the security of America. This paper examines relevant literature about computer security education and training, examines similar programs at other community colleges, and proposes the creation of two certificate training programs, in criminal justice and computer protection. The authors then argue that these two programs are unlike any other program in the country. These two certificates present a two-headed attack to the problem in ways never approached by other community colleges, colleges, or universities. The paper then proposes logistical information and value added impact outcomes for implementing these certificates at St. Petersburg College. The authors conclude by looking at the future for computer security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Security in Academic Institutions 学术机构的资讯安全
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_05
Steffani A. Burd, Scott Cherkin, J. Concannon
Abstract Academic institutions face unique information security threats as well as increasingly frequent and severe incidents, yet they have invested relatively few resources to define and address these issues. Incidents such as information theft, data tampering, viruses, worms, and terrorist activity constitute significant threats to the security of academic institutions. Adverse impacts on academic institutions and the general public include compromised private data, potential attacks on U.S. critical infrastructure, and substantial financial losses. Strategies to remediate these issues must be identified, developed and implemented to curb the trend of increasingly frequent and severe information security incidents as well as the damage they incur. The purpose of this article is to define these emerging information security issues and to propose strategies to remediate them. First, empirically based knowledge of information security in academic institutions must be developed and shared, including quantification of issues, use of appropriate metrics, and identification of best and worst practices. Second, policies for information security must be developed, promulgated and implemented. These policies must balance learning, experimentation, and openness with adequate security measures. Third, the current narrow and fragmented approach to information security practices must be expanded to a holistic, integrated view and the current reactive stance must be changed to a proactive, prescriptive orientation toward information security. Directions for future research, suggestions for policy and practice, and recommendations for information sharing between universities, research institutions, government and law enforcement are provided.
学术机构面临着独特的信息安全威胁以及日益频繁和严重的事件,但它们投入的资源相对较少,无法对这些问题进行定义和解决。信息盗窃、数据篡改、病毒、蠕虫和恐怖活动等事件对学术机构的安全构成重大威胁。对学术机构和公众的不利影响包括私人数据泄露、对美国关键基础设施的潜在攻击以及重大的经济损失。我们必须制订和实施策略,以遏止资讯保安事件日益频繁和严重的趋势,以及它们所造成的损害。本文的目的是定义这些新出现的信息安全问题,并提出解决这些问题的策略。首先,必须开发和共享学术机构中基于经验的信息安全知识,包括问题的量化、适当度量的使用以及最佳和最差实践的识别。第二,必须制定、颁布和实施信息安全政策。这些政策必须在学习、实验和开放与适当的安全措施之间取得平衡。第三,当前信息安全实践中狭隘、碎片化的做法必须扩展到整体、综合的观点,当前被动的立场必须改变为主动、规范的信息安全取向。提出了今后的研究方向、政策和实践建议以及高校、科研机构、政府和执法部门之间信息共享的建议。
{"title":"Information Security in Academic Institutions","authors":"Steffani A. Burd, Scott Cherkin, J. Concannon","doi":"10.1300/J460v01n02_05","DOIUrl":"https://doi.org/10.1300/J460v01n02_05","url":null,"abstract":"Abstract Academic institutions face unique information security threats as well as increasingly frequent and severe incidents, yet they have invested relatively few resources to define and address these issues. Incidents such as information theft, data tampering, viruses, worms, and terrorist activity constitute significant threats to the security of academic institutions. Adverse impacts on academic institutions and the general public include compromised private data, potential attacks on U.S. critical infrastructure, and substantial financial losses. Strategies to remediate these issues must be identified, developed and implemented to curb the trend of increasingly frequent and severe information security incidents as well as the damage they incur. The purpose of this article is to define these emerging information security issues and to propose strategies to remediate them. First, empirically based knowledge of information security in academic institutions must be developed and shared, including quantification of issues, use of appropriate metrics, and identification of best and worst practices. Second, policies for information security must be developed, promulgated and implemented. These policies must balance learning, experimentation, and openness with adequate security measures. Third, the current narrow and fragmented approach to information security practices must be expanded to a holistic, integrated view and the current reactive stance must be changed to a proactive, prescriptive orientation toward information security. Directions for future research, suggestions for policy and practice, and recommendations for information sharing between universities, research institutions, government and law enforcement are provided.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128467787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of a Simple Classroom Laboratory Internet Worm 一个简易教室实验室网络蠕虫的设计与实现
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_04
Christopher Church, Tim Schmoyer, H. Owen
Abstract Beginners to Internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This paper explains the design and implementation of a simple research worm. A discussion of worm structure is provided. Design decisions made in creating our research worm are then given with an emphasis on how they relate to real Internet worms.
互联网安全研究的初学者需要了解蠕虫的内部工作原理。设计在测试网络上运行的一种简单的研究蠕虫有助于理解这一点。本文介绍了一个简单的研究蠕虫的设计与实现。对蜗杆结构进行了讨论。在创建我们的研究蠕虫时所做的设计决策,然后强调它们与真实的互联网蠕虫的关系。
{"title":"Design and Implementation of a Simple Classroom Laboratory Internet Worm","authors":"Christopher Church, Tim Schmoyer, H. Owen","doi":"10.1300/J460v01n02_04","DOIUrl":"https://doi.org/10.1300/J460v01n02_04","url":null,"abstract":"Abstract Beginners to Internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This paper explains the design and implementation of a simple research worm. A discussion of worm structure is provided. Design decisions made in creating our research worm are then given with an emphasis on how they relate to real Internet worms.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adapting Advanced Computer Networking Technologies for Curricula Models in Security Education 先进计算机网络技术在安全教育课程模式中的应用
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_02
T. Posillico
Abstract This paper addresses the issues facing curriculum development of new and current technology in security education. In particular, areas of networking technologies are considered for analysis by examining trends at the university level and comparing case studies of individual curricula models that are currently in use. Effects of “reverse engineering” and deviation from traditional academic development are identified and discussed.
摘要本文论述了安全教育新技术与新技术在课程开发中面临的问题。特别是,通过审查大学一级的趋势和比较目前使用的个别课程模式的个案研究,考虑分析网络技术领域。对“逆向工程”的影响和对传统学术发展的偏离进行了识别和讨论。
{"title":"Adapting Advanced Computer Networking Technologies for Curricula Models in Security Education","authors":"T. Posillico","doi":"10.1300/J460v01n02_02","DOIUrl":"https://doi.org/10.1300/J460v01n02_02","url":null,"abstract":"Abstract This paper addresses the issues facing curriculum development of new and current technology in security education. In particular, areas of networking technologies are considered for analysis by examining trends at the university level and comparing case studies of individual curricula models that are currently in use. Effects of “reverse engineering” and deviation from traditional academic development are identified and discussed.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Use of Honeynets to Increase Computer Network Security and User Awareness 使用蜜网提高计算机网络安全和用户意识
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_03
S. Krasser, J. Grizzard, H. Owen, J. Levine
Abstract In this paper, we address how honeynets, networks of computers intended to be compromised, can be used to increase network security in a large organizational environment. We outline the current threats Internet security is facing at present and show how honeynets can be used to learn about those threats for the future. We investigate issues researchers have to take into account before deploying or while running a honeynet. Moreover, we describe how we tied honeynet research into computer security classes at Georgia Tech to successfully train students and spark interest in computer security.
在本文中,我们讨论了如何使用蜜网,即旨在被破坏的计算机网络,来增加大型组织环境中的网络安全性。我们概述了当前互联网安全面临的威胁,并展示了如何使用蜜网来了解未来的这些威胁。我们调查研究人员在部署或运行蜜网之前必须考虑的问题。此外,我们描述了我们如何将蜜网研究与佐治亚理工学院的计算机安全课程结合起来,成功地培养学生并激发他们对计算机安全的兴趣。
{"title":"The Use of Honeynets to Increase Computer Network Security and User Awareness","authors":"S. Krasser, J. Grizzard, H. Owen, J. Levine","doi":"10.1300/J460v01n02_03","DOIUrl":"https://doi.org/10.1300/J460v01n02_03","url":null,"abstract":"Abstract In this paper, we address how honeynets, networks of computers intended to be compromised, can be used to increase network security in a large organizational environment. We outline the current threats Internet security is facing at present and show how honeynets can be used to learn about those threats for the future. We investigate issues researchers have to take into account before deploying or while running a honeynet. Moreover, we describe how we tied honeynet research into computer security classes at Georgia Tech to successfully train students and spark interest in computer security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
Journal of Security Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1