从计算机工程师等开发网络战士

ID:23767

大小:0.09 MB

页数:10页

时间:2022-11-30

金币:20

上传者:战必胜
26 COMPUTERS IN EDUCATION JOURNAL
DEVELOPING CYBER WARRIORS FROM
COMPUTER ENGINEERS et al.
Barry E. Mullins
Department of Electrical & Computer Engineering
Air Force Institute of Technology
Abstract
This paper discusses the development of a
successful cyber warfare curriculum for computer
and electrical engineering students at the Air
Force Institute of Technology (AFIT). We
leverage two traits exhibited by many engineers as
we continually improve the curriculum. First,
engineers are inherently inquisitive and notorious
for disassembling things to better understand how
they work. Second, the most effective
pedagogical technique is to make the subject
interesting and fun. This paper describes how we
teach various computer-related topics by first
teaching how things (e.g., computer networks and
computer architecture) work in prerequisite
courses and then teaching the students how to
“break” them using cyber operations in our Cyber
Attack course. We find students truly learn when
challenged with defeating a computer protocol or
architecture.
This paper outlines our cyber warfare curriculum
with emphasis on our Cyber Attack and Cyber
Defense course sequences. The paper focuses on
methods used to teach the various phases of cyber
attack to computer and electrical engineers,
computer scientists, cyber operators as well as
other technical majors. The paper also addresses
our participation in the US National Security
Agency-sponsored Cyber Defense Exercise
(CDX). The overarching goal of the curriculum is
to provide students with an understanding of how
to attack and defend in the cyber domain using the
CDX, as well as numerous course-oriented
exercises, as proven effective teaching tools.
Identifying and collecting metrics for
determining success in any course can be difficult.
We use the results of national exercises
(e.g., CDX), student feedback in the form of
anonymous online critiques and test scores as our
metrics. Results show the students are learning
the finer points of computer systems as they hone
their cyber warrior skills necessary to defend our
information systems.
Introduction and Motivation
Securing information systems from intentional
or unintentional information disclosure has
quickly become one of our nation’s top priorities.
There are countless published examples of
corporations and organizations loosing data due to
cyber attacks. A recent high-profile example is
the cyber attack on Google; this incident,
codenamed Operation Aurora, was a highly
sophisticated and targeted attack on Google’s
corporate infrastructure resulting in the theft of
intellectual property[1,2]. It has been postulated
there are even more unpublished or announced
cyber attacks. Given the negative ramifications,
including weakened consumer confidence, many
corporations are leery of publicizing the fact that
they have experienced a cyber attack. U.S.
lawmakers are proposing a bill requiring
corporations to report these attacks[3]. Cyber
attacks are now acknowledged as significant
threats to various nations' security[4-10]. Even
seemingly innocuous attacks can have
ramifications as illustrated by the 2009 U.S.
Presidential election in which Sarah Palen’s
Yahoo email account was hacked[11].
Furthermore, attacks are now targeting SCADA
(Supervisory Control And Data Acquisition)
networks. SCADA networks refer to industrial
and infrastructure control systems which typically
include manufacturing, production, power
generation, water treatment and distribution, oil
and gas pipelines, and electrical power
transmission and distribution including nuclear
power. In fact, the highly-publicized Stuxnet
malware is causing great concern over the future
safety of our citizens given much of our critical
infrastructure relies on potentially vulnerable
information systems[12].
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭