000 04062nam a22006015i 4500
001 978-3-030-59291-2
003 DE-He213
005 20240423125356.0
007 cr nn 008mamaa
008 200910s2020 sz | s |||| 0|eng d
020 _a9783030592912
_9978-3-030-59291-2
024 7 _a10.1007/978-3-030-59291-2
_2doi
050 4 _aLB1028.43-1028.75
072 7 _aJNV
_2bicssc
072 7 _aEDU039000
_2bisacsh
072 7 _aJNV
_2thema
082 0 4 _a371.334
_223
245 1 0 _aInformation Security Education. Information Security in Action
_h[electronic resource] :
_b13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings /
_cedited by Lynette Drevin, Suné Von Solms, Marianthi Theocharidou.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aX, 199 p. 10 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v579
505 0 _aTeaching Methods and Tools -- Learning and Grading Cryptology via Automated Test Driven Software Development -- An Institutional Risk Reduction Model for Teaching Cybersecurity -- Education for the multifaith community of cybersecurity -- Quality Criteria for Cyber Security MOOCs -- An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools -- Cybersecurity Knowledge within the Organisation -- Designing Competency Models for Cybersecurity Professionals for the Banking Sector -- Exploring the Value of a Cyber Threat Intelligence Function in an Organization -- Automating the Communication of Cybersecurity Knowledge: Multi-Case Study -- Gaming for Cybersecurity Training -- A serious game-based peer-instruction digital forensics workshop -- Threat Poker: Gamication of Secure Agile -- Teaching of Detection and Forensics -- How to Teach the Undecidability of Malware Detection Problem and Halting Problem -- Enlivening Port Scanning Exercises withCapture the Flag and Deduction -- Encouraging Equivocal Forensic Analysis through the Use of Red Herrings.
520 _aThis book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.
650 0 _aEducation
_xData processing.
650 0 _aData protection.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aSocial sciences
_xData processing.
650 1 4 _aComputers and Education.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aComputer Application in Social and Behavioral Sciences.
700 1 _aDrevin, Lynette.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVon Solms, Suné.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTheocharidou, Marianthi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030592905
776 0 8 _iPrinted edition:
_z9783030592929
776 0 8 _iPrinted edition:
_z9783030592936
830 0 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v579
856 4 0 _uhttps://doi.org/10.1007/978-3-030-59291-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177262
_d177262