skip to main content
research-article

Taming the diversity of information assurance & security

Published:01 April 2008Publication History
Skip Abstract Section

Abstract

Contemporary presentations of Information Assurance & Security (IAS) are far broader than older notions of "computer security," "network security," "OS security," and the like. The field has become so broad that it is only a slight exaggeration to state that it is difficult to find a sub-discipline of CS to which IAS is not relevant. This broadening of scope leads to many challenges as to how to structure such a course so that it does not appear intimidating in scope or merely a potpourri of marginally related topics. A means of structuring a course to avoid these pitfalls is presented here.

References

  1. Bishop, M., Introduction to Computer Security, Addison-Wesley (Boston), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Carroll, J. M., Computer Security(3rd), Butterworth-Heinemann (Burlington, MA), 2007.Google ScholarGoogle Scholar
  3. Dark, M. J., Ekstrom, J. J., Lunt, B. M., "Integration of information assurance and security into the IT2005 model curriculum," Conference On Information Technology Education, Proceedings of the 6th Conference on Information Technology Education, Newark, NJ, ACM Press (New York), 2005, 7--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Easttom, C., Computer Security Fundamentals, Prentice Hall Security Series (Upper Saddle River, NJ), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gollmann, D., Computer Security, Wiley (Hoboken, NJ), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jensen, B. K., Cline, B., Guynes, C. S., "Teaching the undergraduate CS information security course," SIGCSE Bulletin, Vol. 38, No. 2, ACM (New York), June 2006, 61--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. JERIC, "A 2007 model curriculum for a liberal arts degree in computer science," Journal on Educational Resources in Computing (JERIC), Vol. 7, No. 2 (June 2007), ACM Press (New York), Article 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. McCumber, J., Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Auerbach/CRC Press (Boca Raton, FL), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Myers, J. P. Jr. & Riela, S., "Embracing the diversity of information security," in preparation.Google ScholarGoogle Scholar
  10. National Security Telecommunications and Information Systems Security Comm., "National Training Standard for Information Systems Security (INFOSEC) Professionals," NSTISSI No. 4011, National Security Agency, Fort George G. Meade, MD (June 20, 1994).Google ScholarGoogle Scholar
  11. Pfleeger, C. P. & Pfleeger, S. L., Security in Computing (4th ed.), Prentice Hall (Upper Saddle River, NJ), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Pieprzyk, J., Hardjono, T., & Seberry, J., Fundamentals of Computer Security, Springer (New York), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Riela, S., "Information Assurance: Concept Curriculum," unpubl. report, Dec. 2005.Google ScholarGoogle Scholar
  14. Salomon, D., Foundations of Computer Security, Springer (New York), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. SIGITE (ACM Special Interest Group on Information Technology Education), "Computing Curricula: Information Technology Volume" (Draft), April 2005, http://www.sigite.org/content/activities/curriculum/downloads/IT%20Volume-April%202005.pdfGoogle ScholarGoogle Scholar
  16. Solomon, M. G. & Chapple, M., Information Security Illuminated, Jones & Bartlett (Sudbury, MA), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Spinello, R. A., CyberEthics -- Morality and Law in Cyberspace (3rd ed.), Jones & Bartlett (Sudbury, MA), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tucker, A. B. (ed.), "Computing Curricula 1991," Communications of the ACM, Vol. 34, No. 6 (June 1991), ACM (New York), 68--84. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Taming the diversity of information assurance & security

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Journal of Computing Sciences in Colleges
            Journal of Computing Sciences in Colleges  Volume 23, Issue 4
            April 2008
            286 pages
            ISSN:1937-4771
            EISSN:1937-4763
            Issue’s Table of Contents

            Publisher

            Consortium for Computing Sciences in Colleges

            Evansville, IN, United States

            Publication History

            • Published: 1 April 2008
            Published in jcsc Volume 23, Issue 4

            Qualifiers

            • research-article
          • Article Metrics

            • Downloads (Last 12 months)1
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader