A New Construction Scheme for Information Security Lab

Abstract

At present, it is urgent for us to build fully functional information security laboratory. In this paper, the function and requirements of a new information security lab are analyzed. And a construction scheme for information security laboratory is put forward. The lab not only provides services for teaching and training, but also provides security evaluation, authentication and extension services for local governments, institutions and enterprises. Our teaching and training practice shows that the scheme of such information security laboratory proposed in this paper is effective and reasonable.

Share and Cite:

Zhu, L. , Mao, H. & Hu, Z. (2012). A New Construction Scheme for Information Security Lab. Creative Education, 3, 406-412. doi: 10.4236/ce.2012.34064.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Aboutabl, M. S. (2006). The CyberDefense laboratory: A framework for information security education. Proceedings of the 2006 IEEE Workshop on Information Assurance, Phoenix, 10-12 April 2006. doi:10.1109/IAW.2006.1652077
[2] Gu, N. J., & Huang, L. S. (2006). Exploration on information security professional curriculum. Journal of Beijing Electronic Science & Technology Institute, 14, 13.
[3] O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. SIGCSE’06(ACM), Houston, 1-5 March 2006.
[4] Wang, H. H., Tan, Y. S., & Huang, W. Z. (2006). Discussion on information security professional talent training mode. Journal of Wuhan Institute of Chemical Technology, 28, 56-59.
[5] Yang, T. A., Yue, K.-B., & Liaw, M. et al. (2004). Design of a distributed computer security lab. Journal of Computing Sciences in Colleges, 20, 332-346.
[6] Zhang, H. G., Huang, C. H., & Liu, Y. Z. (2004). Talent training and course system of Information security profession. High Science Education, 2, 16-20.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.