Distributed computing and computer security education

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.

Original languageEnglish
Title of host publicationProceedings of the 6th Conference on Information Technology Education, SIGITE 2005
Pages383-384
Number of pages2
DOIs
StatePublished - 1 Dec 2005
Event6th ACM SIG-Information Technology Education Conference, SIGITE 2005 - Newark, NJ, United States
Duration: 20 Oct 200522 Oct 2005

Publication series

NameProceedings of the 6th Conference on Information Technology Education, SIGITE 2005

Other

Other6th ACM SIG-Information Technology Education Conference, SIGITE 2005
CountryUnited States
CityNewark, NJ
Period20/10/0522/10/05

Keywords

  • class projects
  • inexpensive computing
  • passwords
  • prime numbers

Fingerprint Dive into the research topics of 'Distributed computing and computer security education'. Together they form a unique fingerprint.

Cite this