Advertisement

A Tutoring System for IT Security

  • Ji Hu
  • Michael Schmitt
  • Christian Willems
  • Christoph Meinel
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)

Abstract

Due to the many vulnerabilities of today’s computer systems, IT security education has become an important topic. For that reason, a new tutoring system is developed at the Institute for Telematics, Trier, that allows users to gain knowledge about security technologies and tools via a web browser interface. Unlike other systems, this tutoring system does not provide a restricted simulation environment. Instead, guided exercises are performed on a real system (Linux). In this paper, the user interface and architecture of the tutoring system as well as some implementation aspects and future enhancements are described.

Key words

IT Security Tutoring System 

References

  1. Cao, Jiannong, Chan, Alvin, Cao, Weidong, and Yeung, Cassidy (2002). Virtual Programming Lab for Online Distance Learning. In Proceedings of the First International Conference, ICWL 2002, pages 216–227, Hongkong, China.Google Scholar
  2. Dike, Jeff (2000). A user-mode port of the Linux kernel. In Proceedings of the 4th Annual Linux Showcase & Conference, page 63, Atlanta, GA. Usenix.Google Scholar
  3. Lindskog, Stefan, Lindqvist, Ulf, and Jonsson, Erland (1999). IT Security Research and Education in Synergy. In Proceedings of the 1st World Conference on Information Security Education,Stockholm, Sweden.Google Scholar
  4. Persché, Richard (1997). Immediate Feedback During Online Lectures. Master’s thesis, Institute for Information Processing and Computer Supported New Media of the Graz University of Technology, Graz, Austria.Google Scholar
  5. Rowe, N. C. and Schiavo, S. (1998). An Intelligent Tutor for Intrusion Detection on Computer System. Computers and Education, pages 395–404.Google Scholar
  6. Sleeman, D. and Brown, J.S. (1982). Intelligent Tutoring Systems. Academic Press Ltd., London.Google Scholar
  7. Woo, Chong-woo, Choi, Jin-woo, and Evens, Martha (2002). Web-based ITS for Training System Managers on the Computer Intrusion. In Proceedings of the 6th International conference ITS 2002, pages 311–319, Biarritz, France and San Sebastian, Spain.zbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Ji Hu
    • 1
  • Michael Schmitt
    • 1
  • Christian Willems
    • 1
  • Christoph Meinel
    • 1
  1. 1.Research Group “Institute for Telematics”University of TrierTrierGermany

Personalised recommendations