Virtualization technology in teaching information technology security
The effective way to educate students on using technologies is through hands-on experience. Learning a subject by hands-on experience can synchronize their head and hands, making the subject matter easier to be absorbed as well as stimulating the mind of the students to be more creative and innovati...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/6978/1/virtual.pdf http://eprints.utem.edu.my/id/eprint/6978/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.6978 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.69782023-07-20T12:09:26Z http://eprints.utem.edu.my/id/eprint/6978/ Virtualization technology in teaching information technology security Masud, Mohd Zaki Hamid, Erman Mat Ariff, Nor Azman Abdollah, Mohd Faizal Selamat, Siti Rahayu QA75 Electronic computers. Computer science The effective way to educate students on using technologies is through hands-on experience. Learning a subject by hands-on experience can synchronize their head and hands, making the subject matter easier to be absorbed as well as stimulating the mind of the students to be more creative and innovative. In teaching information Technology Security, exposing the student to real-time scenario of threat and safeguarding network resources expose the student to the real danger of exploitation and the devastating effect of security breach on network infrastructure. Unfortunately this requires a huge amount of time and cost for preparing and setting up the equipment and software for the practical session. Moreover, most of the activity in a security subject can also jeopardize other devices in the real network, for instance simulating a worm attack or hijacking server attack might affect the whole network of the campus. Thus, a special laboratory environment that can be set up with minimal cost, is easy to manage and can isolate the hazardous activities from the real environment is needed. In order to alleviate this problem, this paper presents an implementation of Virtualization Technology in teaching Information Technology Security which allows labs to progress in a secure and portable manner while providing additional protection for the real systems. 2010 Conference or Workshop Item PeerReviewed text en http://eprints.utem.edu.my/id/eprint/6978/1/virtual.pdf Masud, Mohd Zaki and Hamid, Erman and Mat Ariff, Nor Azman and Abdollah, Mohd Faizal and Selamat, Siti Rahayu (2010) Virtualization technology in teaching information technology security. In: The 3rd Regional Conference on Engineering Education (RCEE 2010) and Research in Higher Education 2010 , 7 - 9 June 2010, Kuching Sarawak. |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Masud, Mohd Zaki Hamid, Erman Mat Ariff, Nor Azman Abdollah, Mohd Faizal Selamat, Siti Rahayu Virtualization technology in teaching information technology security |
description |
The effective way to educate students on using technologies is through hands-on experience. Learning a subject by hands-on experience can synchronize their head and hands, making the subject matter easier to be absorbed as well as stimulating the mind of the students to be more creative and innovative. In teaching information Technology Security, exposing the student to real-time scenario of threat and safeguarding network resources expose the student to the real danger of exploitation and the devastating effect of security breach on network infrastructure. Unfortunately this requires a huge amount of time and cost for preparing and setting up the equipment and software for the practical session. Moreover, most of the activity in a security subject can also jeopardize other devices in the real network, for instance simulating a worm attack or hijacking server attack might affect the whole network of the campus. Thus, a special laboratory environment that can be set up with minimal cost, is easy to manage and can isolate the hazardous activities from the real environment is needed. In order to alleviate this problem, this paper presents an implementation of Virtualization Technology in teaching Information Technology Security which allows labs to progress in a secure and portable manner while providing additional protection for the real systems. |
format |
Conference or Workshop Item |
author |
Masud, Mohd Zaki Hamid, Erman Mat Ariff, Nor Azman Abdollah, Mohd Faizal Selamat, Siti Rahayu |
author_facet |
Masud, Mohd Zaki Hamid, Erman Mat Ariff, Nor Azman Abdollah, Mohd Faizal Selamat, Siti Rahayu |
author_sort |
Masud, Mohd Zaki |
title |
Virtualization technology in teaching information technology security |
title_short |
Virtualization technology in teaching information technology security |
title_full |
Virtualization technology in teaching information technology security |
title_fullStr |
Virtualization technology in teaching information technology security |
title_full_unstemmed |
Virtualization technology in teaching information technology security |
title_sort |
virtualization technology in teaching information technology security |
publishDate |
2010 |
url |
http://eprints.utem.edu.my/id/eprint/6978/1/virtual.pdf http://eprints.utem.edu.my/id/eprint/6978/ |
_version_ |
1772815989766881280 |
score |
13.211869 |