Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains

Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains MARCIN LUKOWIAK, STANISLAW RADZISZOWSKI, JAMES VALLINO, and CHRISTOPHER WOOD, Rochester Institute of Technology With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements. This calls for careful attention to algorithm choice and implementation method, as well as trade-offs between hardware and software implementations. This article describes motivation and efforts taken by three departments at Rochester Institute of Technology (Computer Engineering, Computer Science, and Software Engineering) that were focused on creating a multidisciplinary course that integrates the algorithmic, engineering, and practical aspects of security as exemplified by applied cryptography. In particular, the article presents the structure of this new course, topics covered, lab tools and results from the first two spring quarter offerings in 2011 and 2012. Categories and Subject Descriptors: K.3.2 [Computers and Education]: Computer and Information Science Education--Information systems education General Terms: Design, Performance, Security Additional Key Words and Phrases: Security-oriented curriculum, hardware and software design, cybersecurity education, http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM Transactions on Computing Education (TOCE) Association for Computing Machinery

Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains

Loading next page...
 
/lp/association-for-computing-machinery/cybersecurity-education-bridging-the-gap-between-hardware-and-software-8sXnYiMLGG

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 2014 by ACM Inc.
ISSN
1946-6226
DOI
10.1145/2538029
Publisher site
See Article on Publisher Site

Abstract

Cybersecurity Education: Bridging the Gap Between Hardware and Software Domains MARCIN LUKOWIAK, STANISLAW RADZISZOWSKI, JAMES VALLINO, and CHRISTOPHER WOOD, Rochester Institute of Technology With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements. This calls for careful attention to algorithm choice and implementation method, as well as trade-offs between hardware and software implementations. This article describes motivation and efforts taken by three departments at Rochester Institute of Technology (Computer Engineering, Computer Science, and Software Engineering) that were focused on creating a multidisciplinary course that integrates the algorithmic, engineering, and practical aspects of security as exemplified by applied cryptography. In particular, the article presents the structure of this new course, topics covered, lab tools and results from the first two spring quarter offerings in 2011 and 2012. Categories and Subject Descriptors: K.3.2 [Computers and Education]: Computer and Information Science Education--Information systems education General Terms: Design, Performance, Security Additional Key Words and Phrases: Security-oriented curriculum, hardware and software design, cybersecurity education,

Journal

ACM Transactions on Computing Education (TOCE)Association for Computing Machinery

Published: Mar 1, 2014

There are no references for this article.