Design and Implementation of an Information Security Laboratory

ABSTRACT

It has been recognized for some time now that education in information security is better served by a laboratory component that reinforces principle and theoretical analysis learnt in the class room with a follow-up hands-on component performed in an appropriate laboratory. In this paper we present the design of a highly reconfigurable laboratory for information security education. The design has been implemented successfully in ISIS - The Information Systems and Internet Security Laboratory at Polytechnic University. We also describe the rationale for our design and give examples of a few typical assignments that the laboratory facilitates.


AUTHORS

Department of Computer Science, Polytechnic University, Brooklyn, NY

Vikram Padman is a graduate student at Polytechnic University in Brooklyn, NY. He received his B.S. degree in Computer Engineering from Polytechnic University in 2002. His current research focuses on developing efficient host intrusion detection systems.

Associate Professor, Computer Science Department, Polytechnic University, Brooklyn,New York

Nasir Memon is an Associate Professor in the Computer Science Department at Polytechnic University, New York. He received his B.E. in Chemical Engineering and M.Sc. in Mathematics from the Birla Institute of Technology, Pilani, India and received his M.S. and Ph.D. degrees from the University of Nebraska, in Computer Science. He has held an assistant professor position at Arkansas State University and at Northern Illinois University. He was also a visiting faculty at Hewlett Packard Laboratories, Palo Alto, California in 1997-98. His research interests include Data Compression, Computer and Network Security, Multimedia Data Security and Multimedia Communications.

Professor of Computer Science, Polytechnic University, Brooklyn, New York, USA;
Director, Wireless Internet Center for Advanced Technology (WICAT)

Phyllis G. Frankl is a Professor of Computer Science at Polytechnic University in Brooklyn, New York, USA and the Director of the Wireless Internet Center for Advanced Technology (WICAT). She received a B.A. degree in mathematics and physics from Brandeis University, an M.A. degree in mathematics from Columbia University, and M.S. and Ph.D. degrees in computer science from New York University's Courant Institute of Mathematical Sciences. Prof. Frankl's research interests include software engineering, wireless information systems and computer security.

Department of Computer Science, Polytechnic University, Brooklyn, NY
USA

Gleb Naumovich received a PhD in Computer Science from the University of Massachusetts, Amherst in 1999. His research interests are in the areas of software engineering, programming languages, application security, and intellectual property protection. His current work focuses on optimizing model checking tools for software. He also works on developing static techniques for detection of security bugs in distributed Java programs.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com