index - Information Security Education. Information Security in Action Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Security Education. Information Security in Action
Lynette Drevin, Suné von Solms, Marianthi Theocharidou
Front Matter

Teaching Methods and Tools


Learning and Grading Cryptology via Automated Test Driven Software Development
Konstantin Knorr
3-17
An Institutional Risk Reduction Model for Teaching Cybersecurity
Erik Moore, Daniel Likarish, Bobbie Bastian, Michael Brooks
18-31
Education for the Multifaith Community of Cybersecurity
Steven Furnell, Matt Bishop
32-45
Quality Criteria for Cyber Security MOOCs
Simone Fischer-Hübner, Matthias Beckerle, Alberto Lluch Lafuente, Antonio Ruiz Martínez, Karo Saharinen, Antonio Skarmeta, Pierantonia Sterlini
46-60
An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools
Stylianos Karagiannis, Elpidoforos Maragkos-Belmpas, Emmanouil Magkos
61-77

Cybersecurity Knowledge Within the Organisation


Designing Competency Models for Cybersecurity Professionals for the Banking Sector
Andrey Vybornov, Natalia Miloslavskaya, Alexander Tolstoy
81-95
Exploring the Value of a Cyber Threat Intelligence Function in an Organization
Jacques Ophoff, Anzel Berndt
96-109
Automating the Communication of Cybersecurity Knowledge: Multi-case Study
Alireza Shojaifar, Samuel Fricker, Martin Gwerder
110-124

Gaming for Cybersecurity Training


A Serious Game-Based Peer-Instruction Digital Forensics Workshop
Ludwig Englbrecht, Günther Pernul
127-141
Threat Poker: Gamification of Secure Agile
Audun Jøsang, Viktoria Stray, Hanne Rygge
142-155

Teaching of Detection and Forensics


How to Teach the Undecidability of Malware Detection Problem and Halting Problem
Matthieu Journault, Pascal Lafourcade, Malika More, Rémy Poulain, Léo Robert
159-169
Enlivening Port Scanning Exercises with Capture the Flag and Deduction
Frans Blauw
170-183
Encouraging Equivocal Forensic Analysis Through the Use of Red Herrings
Wai Leung
184-197

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/