V-isoNet: A virtualised and isolated network using open source technologies

Gleeson, M. and Markey, D. and Mtenzi, F. (2010) V-isoNet: A virtualised and isolated network using open source technologies. Journal of Digital Information Management, 8 (2). pp. 95-100. ISSN 09727272 (ISSN)

Full text not available from this resource.
Official URL: http://www.scopus.com/inward/record.url?eid=2-s2.0...

Abstract

Computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational institutions in teaching, from both an educational and technical perspective. The School of Computing in Dublin Institute of Technology offers two Security and Forensic Computing modules, a 4th year BSc (Hons) module and an MSc module. Currently the BSc module requires a practical section to the course while the MSc module does not require practical work. In order to aid teaching during the next semester, both sets of students will be exposed to a Security and Forensics practical laboratory. This series of research proposes a phased approach to design and establish a suitable overall environment to provide a comprehensive Computer Security and Forensics practical laboratory. The three identifiable components are (1) an isolated networked environment, (2) an exposed repository to be used to demonstrate vulnerabilities and (3) the formation of a Security and Forensics toolkit to be used in conjunction with the isolated network environment and the exposed repository. This first paper, in a series of three, will introduce the reader to the overall research objective. It will then focus on research and development of the first identified component, namely an isolated network environment.

Item Type: Article
Additional Information: Export Date: 23 February 2015; Correspondence Address: Gleeson, M.; School of Computing, Dublin Institute of Technology, Kevin Street, Dublin, Ireland; email: michael.gleeson@comp.dit.ie; References: Yang, T.A., Computer security and impact on computer science education (2001) JCSC, 16 (4), pp. 223-246. , CCSC, USA, May; Logan, P.Y., Clarkson, A., Teaching students to hack: Curriculum issues in information security (2005) Proceedings of the Thirty-Sixth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, pp. 157-161. , Proceedings of the Thirty-Sixth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005; Bishop, M., Heberlein, L.T., An isolated network for research (1996) Proceedings of the 19th National Information Systems Security Conference, , Baltimore, Maryland, Oct; Mattord, H.J., Whitman, M.E., Planning, building and operating the information security and assurance laboratory (2004) Proceedings of the 1st Annual Conference on Information Security Curriculum Development, , Oct, Kennesaw, Georgia; Hill, J.M.D., Carver Jr., C.A., Humphries, J.W., Pooch, U.W., Using an isolated network laboratory to teach advanced networks and security (2001) SIGCSE Bulletin (Association for Computing Machinery, Special Interest Group on Computer Science Education), pp. 36-40; Madnick, S.E., Donovan, J.J., Application and analysis of the virtual machine approach to information system security and isolation (1973) Proceedings of the Workshop on Virtual Computer Systems, , March, Cambridge, Massachusetts; Huang, W., Liu, J., Abali, B., Panda, D.K., A case for high performance computing with virtual machines (2006) Proceedings of the 20th Annual International Conference on Supercomputing, , June, Cairns, Australia; Vallee, G., Naughton, T., Scott, S.L., System management software for virtual environments (2007) Proceedings of the 4th International Conference on Computing Frontiers, , May, Ischia, Italy
Uncontrolled Keywords: Education; Forensics; Isolated; Network; Open source; Security; Virtualization; Open sources; Virtualizations; Computer crime; Research; Security systems; Teaching; Computer forensics
Depositing User: National Forum
Date Deposited: 09 Dec 2015 19:56
Last Modified: 09 Dec 2015 19:57
URI: http://eprints.teachingandlearning.ie/id/eprint/2368

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year