Teaching Network Security in a Virtual Learning Environment

By Bergstrom, Laura; Grahn, Kaj J. et al. | Journal of Information Technology Education, Annual 2004 | Go to article overview

Teaching Network Security in a Virtual Learning Environment


Bergstrom, Laura, Grahn, Kaj J., Karlstrom, Krister, Pulkkis, Goran, Astrom, Peik, Journal of Information Technology Education


Introduction

The requirements of information security have undergone three major changes in the last decades. The first major change was the introduction of the computer. The need for protecting files and information became evident. Collection of tools and procedures designed to protect data and to control access to computing resources has the generic name computer security. The second major change was the introduction of distributed systems, networks, and facilities for data communication. Network security measures are needed

to protect data during transmission and storage

to control access to networks and network nodes.

The third change is the current, rapid development of wireless networks and mobile communications. Wireless security is therefore of high priority today. Network security implies restrictions such as

network traffic filtering with firewall technology

defense against distribution of malicious programs like viruses

prevention, detection and management of intrusion

prevention of unwanted data communication like email spamming.

Cryptography is needed for

reliable authentication

integrity of information content

confidentiality

nonrepudiation

in data processing, in data communication, and in the storing of data (Stallings, 2002). Reliable authentication means that network resource users and communication partners can be unambiguously identified. Integrity of information content requires reliable methods to check that transmitted and stored information remains unchanged. Confidentiality means that the originator of information can determine who has (have) the right to read the information content. Non-repudiation means that the authenticated information exchange can afterwards be unambiguously proved to have happened. Nonrepudiation is achieved by attaching to information records cryptographic digital signatures, which can be verified at any future moment of time. The importance of cryptography and the number of application areas are steadily growing.

Network security requires active administration. Security policies, standards and administrative procedures must be worked out, implemented and followed up.

Network security skills are thus needed by practically any user of a computer connected to a network. Presently there is a growing demand for network security professionals for

security administration of data and IT infrastructures

development of network security technology and methodology

delivery of support and training to network user in security related issues.

A virtual, survey oriented Network Security course, available to students of all polytechnics in a country, encourages individual polytechnics to concentrate their educational resources on highly needed, specialized, and also custom designed network security education.

Course Development

The Finnish Virtual Polytechnic

The Finnish educational system in a nutshell is illustrated in Figure 1. Compulsory basic education at comprehensive schools is given to all children between the ages of 7 and 16. Education is voluntary after completing the comprehensive school. Students may go to upper secondary school providing three years of general education, or to vocational education lasting from two to five years. Both of these give a general qualification for polytechnic and university studies ("The Finnish educational system," 2002), see Figure 1.

The action plan of the Ministry of Education in Finland for years 2000--2004 includes Virtual School, Virtual Polytechnic and Virtual University. Briefly the strategy and goals for the Finnish

[FIGURE 1 OMITTED]

Virtual Polytechnic are: (The Virtual Polytechnic of Finland, 2002):

The Finnish Virtual Polytechnic is common for all Finnish Polytechnics

It produces and provides high level learning services

The Finnish Virtual Polytechnic uses modern information and communication technology

The Finnish Virtual Polytechnic uses modern pedagogical solutions in networks

Increase co-operation between polytechnics and the knowledge of virtual learning

Build up a common portal for all students in Finnish polytechnics

Co-operation with other local and international projects

Quality assurance

Copyright questions (teacher--institution--outer world)

Support for teachers who are producing material

Standardization including learning platforms, material modules meta data, student administration and economical aspects

The main result of the Finnish Virtual Polytechnic will be more cooperation between different polytechnics. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Teaching Network Security in a Virtual Learning Environment
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.