Share This Article:

A New Construction Scheme for Information Security Lab

Abstract Full-Text HTML Download Download as PDF (Size:961KB) PP. 406-412
DOI: 10.4236/ce.2012.34064    4,088 Downloads   5,911 Views   Citations

ABSTRACT

At present, it is urgent for us to build fully functional information security laboratory. In this paper, the function and requirements of a new information security lab are analyzed. And a construction scheme for information security laboratory is put forward. The lab not only provides services for teaching and training, but also provides security evaluation, authentication and extension services for local governments, institutions and enterprises. Our teaching and training practice shows that the scheme of such information security laboratory proposed in this paper is effective and reasonable.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Zhu, L. , Mao, H. & Hu, Z. (2012). A New Construction Scheme for Information Security Lab. Creative Education, 3, 406-412. doi: 10.4236/ce.2012.34064.

References

[1] Aboutabl, M. S. (2006). The CyberDefense laboratory: A framework for information security education. Proceedings of the 2006 IEEE Workshop on Information Assurance, Phoenix, 10-12 April 2006. doi:10.1109/IAW.2006.1652077
[2] Gu, N. J., & Huang, L. S. (2006). Exploration on information security professional curriculum. Journal of Beijing Electronic Science & Technology Institute, 14, 13.
[3] O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. SIGCSE’06(ACM), Houston, 1-5 March 2006.
[4] Wang, H. H., Tan, Y. S., & Huang, W. Z. (2006). Discussion on information security professional talent training mode. Journal of Wuhan Institute of Chemical Technology, 28, 56-59.
[5] Yang, T. A., Yue, K.-B., & Liaw, M. et al. (2004). Design of a distributed computer security lab. Journal of Computing Sciences in Colleges, 20, 332-346.
[6] Zhang, H. G., Huang, C. H., & Liu, Y. Z. (2004). Talent training and course system of Information security profession. High Science Education, 2, 16-20.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.