Distributed computing and computer security education

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing. © 2005 author.

Cite

CITATION STYLE

APA

Robila, S. A. (2005). Distributed computing and computer security education. In Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005 (pp. 383–384). https://doi.org/10.1145/1095714.1095803

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free