Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/83745
Citations
Scopus Web of ScienceĀ® Altmetric
?
?
Type: Conference paper
Title: Applying puzzle-based learning to cyber-security education
Author: Dasgupta, D.
Ferebee, D.
Michalewicz, Z.
Citation: Proceedings of the 2013 Information Security Curriculum Development Conference, InfoSec CD 2013, 2013 / M. E. Whitman (ed.), pp.20-26
Publisher: Association for Computing Machinery
Publisher Place: United States
Issue Date: 2013
ISBN: 9781450325479
Conference Name: Information Security Curriculum Development Conference (2013 : Kennesaw)
Statement of
Responsibility: 
Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz
Abstract: Cyber-enabled devices are becoming more and more complex with integration of new capabilities and functionalities, both in software and hardware, making it very difficult for users to realize that they are under cyber attack or the cause of data breach, etc. It is also well-known fact that vulnerabilities at one component can affect other components in any computing device. But it is hard to realize the interdependencies of various components in order to secure the entire path to in and out of a cyber system. Puzzle-based Learning approach proved to have improved learning environment including mathematics, physics and computer science, however, there is very little work has been done in computer and cyber security. We introduced the Puzzle-based Learning to basic cyber security education. We believe that such an interactive learning environment will help students to understand complex attack paths and countermeasures for fraud detection, cybercrime, and advanced persistent threats (APTs). Students can learn not only to protect a specific system but also for a class of Internet-enabled systems with different hardware/software components and architecture, providing similar services.
Keywords: Cyber security education
problem-solving skills
puzzle-based learning
and critical thinking
Rights: Copyright 2013 ACM
DOI: 10.1145/2528908.2528910
Published version: http://dx.doi.org/10.1145/2528908.2528910
Appears in Collections:Aurora harvest 4
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.