Amazon cover image
Image from Amazon.com

Information Security Education. Information Security in Action [electronic resource] : 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /

Contributor(s): Material type: TextTextSeries: IFIP Advances in Information and Communication Technology ; 579Publisher: Cham : Springer International Publishing : Imprint: Springer, 2020Edition: 1st ed. 2020Description: X, 199 p. 10 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030592912
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 371.334 23
LOC classification:
  • LB1028.43-1028.75
Online resources:
Contents:
Teaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises withCapture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Teaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises withCapture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in