Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Training the cyber warrior
Fulp J. In Security education and critical infrastructures. Norwell, MA,  Kluwer Academic Publishers,  2003. Type:Book Chapter
Date Reviewed: Jan 5 2004

As the title suggests, this chapter uses military principles and terminology to describe important components of an information technology education: security and maintaining information assurance. The paper is clearly written and well documented.

Fulp suggests that a curriculum must include an introduction to information assurance concepts throughout. In particular, the core courses should include, as a minimum, the topics reference monitor concept, the risk management equation, the defense-in-depth paradigm, and the principle of least privilege. This topics list could be augmented to include holistic security.

The paper discusses adding two curricular specializations to the core, in particular, follow-on courses to emphasize first tactical approaches and second strategic approaches to network security. For a capstone experience, the author describes adversarial exercises between student teams and “information warfare professionals from [the] NSA [National Security Agency]” to test network security. In addition to these adversarial exercises, the author’s curriculum should include reading exercises about current security issues. I suggest that resources such as http://csrc.nist.gov be used in the reading exercises, and should be part of the continuing education of the cyber warrior.

An important contribution of the paper is the author’s clear separation between the tactical and strategic approaches in information assurance methodology. This division is an important point for all information workers, particularly information technology managers and educators. The principles and terminology of this challenge are clearly described by the author.

Reviewer:  G. Williams Review #: CR128837 (0405-0679)
Bookmark and Share
 
Military (J.1 ... )
 
 
Government (J.1 ... )
 
 
Internet (H.4.3 ... )
 
 
Quality Assurance (K.6.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Software Quality Assurance (SQA) (D.2.9 ... )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Military": Date
The special problems of military systems
Kershaw J. Microprocessors & Microsystems 17(1): 25-30, 1993. Type: Article
May 1 1994
Strategic appraisal
Khalilzad Z., White J., RAND, Santa Monica, CA, 1999. Type: Book (9780833026637)
Aug 1 1999
Making intelligence smarter
Zorpette G. IEEE Spectrum 39(1): 38-43, 2002. Type: Article
Jan 23 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy