Using Virtual Security Lab in Teaching Cryptography

Full Text (PDF, 421KB), PP.26-32

Views: 0 Downloads: 0

Author(s)

Salma M. Gaffer 1,* Daniyal M. Alghazzawi 1

1. Information Systems Department, King Abdulaziz University, Jeddah Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2012.01.04

Received: 25 Sep. 2011 / Revised: 4 Oct. 2011 / Accepted: 5 Dec. 2011 / Published: 8 Jan. 2012

Index Terms

Information Security, cryptography, Virtual lab

Abstract

Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to measure the performance of the students’ outcomes in the lab comparing with other students from a previous semester. The result of the survey shows a significant feedback on the system.

Cite This Paper

Salma M. Gaffer, Daniyal M. Alghazzawi, "Using Virtual Security Lab in Teaching Cryptography", International Journal of Modern Education and Computer Science (IJMECS), vol.4, no.1, pp.26-32, 2012. DOI:10.5815/ijmecs.2012.01.04

Reference

[1]VMware Inc., “VMware Player”, available http://www.vmware.com/ products/player.
[2]Microsoft Inc., “Microsoft Virtual PC”, available http://www.microsoft.com/windows/downloads/virtualpc
[3]L. Tao, “Introduction to Cryptography”, available http://csis.pace.edu/lixin/download/lab-cryptography.pdf, 2010.
[4]Lixin Tao, Li-Chiou Chen, and Chienting Lin,Virtual Open-Source Labs for Web Security Education, Proceedings of the World Congress on Engineering and Computer Science 2010 Vol I
[5]Harry Bulbrook, Using Virtual Machines to provide a secure Teaching Lab environment
[6]L. Chen, “Secure Web Development Teaching Modules”, SWEET project web site, available http://csis.pace.edu/~lchen/sweet.
[7]Christian Willems, Orestis Tringides, Christoph Meinel, Practical IT Security Education with Tele-Lab
[8]http://csis.pace.edu/~lchen/sweet/
[9]C.H. Lindsey, Regulation of Investigatory Powers Bill: Some Scenarios, 2000