Distributed computing and computer security education

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.

Original languageEnglish
Title of host publicationProceedings of the 6th Conference on Information Technology Education, SIGITE 2005
Pages383-384
Number of pages2
DOIs
StatePublished - 1 Dec 2005
Event6th ACM SIG-Information Technology Education Conference, SIGITE 2005 - Newark, NJ, United States
Duration: 20 Oct 200522 Oct 2005

Publication series

NameProceedings of the 6th Conference on Information Technology Education, SIGITE 2005

Other

Other6th ACM SIG-Information Technology Education Conference, SIGITE 2005
CountryUnited States
CityNewark, NJ
Period20/10/0522/10/05

Fingerprint

Distributed computer systems
Security of data
Education
Students
Cluster computing
Computer hardware
Cryptography
Teaching
Servers

Keywords

  • class projects
  • inexpensive computing
  • passwords
  • prime numbers

Cite this

Robila, S. (2005). Distributed computing and computer security education. In Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005 (pp. 383-384). (Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005). https://doi.org/10.1145/1095714.1095803
Robila, Stefan. / Distributed computing and computer security education. Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. 2005. pp. 383-384 (Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005).
@inproceedings{99dfae702ebc4a6c8b745bf816436ab5,
title = "Distributed computing and computer security education",
abstract = "This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.",
keywords = "class projects, inexpensive computing, passwords, prime numbers",
author = "Stefan Robila",
year = "2005",
month = "12",
day = "1",
doi = "10.1145/1095714.1095803",
language = "English",
isbn = "1595932526",
series = "Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005",
pages = "383--384",
booktitle = "Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005",

}

Robila, S 2005, Distributed computing and computer security education. in Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, pp. 383-384, 6th ACM SIG-Information Technology Education Conference, SIGITE 2005, Newark, NJ, United States, 20/10/05. https://doi.org/10.1145/1095714.1095803

Distributed computing and computer security education. / Robila, Stefan.

Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. 2005. p. 383-384 (Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Distributed computing and computer security education

AU - Robila, Stefan

PY - 2005/12/1

Y1 - 2005/12/1

N2 - This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.

AB - This paper presents our experience in using cluster computing when teaching Computer and Data Security. The background knowledge together with the topics that fit the best applications of distributed computing and the hardware and software needs are discussed. Several project activities are presented with some analyzed in detail. The first requires the students to develop a computer cluster out of a regular public lab and use it for building security attacks such as password and encryption key cracking. The second deals with prime number generation using a client /server architecture (implemented in Java) and an Oracle database complemented by the implementation of resiliency (reassigning jobs when a node dies). These projects allow the implementation of real world - like attacks while using relatively inexpensive resources. Based on class assessment, they were highly appreciated by the students, increasing their awareness on the power of distributed computing with respect to data security and ensuring their preparedness to further advances in computing.

KW - class projects

KW - inexpensive computing

KW - passwords

KW - prime numbers

UR - http://www.scopus.com/inward/record.url?scp=77956325712&partnerID=8YFLogxK

U2 - 10.1145/1095714.1095803

DO - 10.1145/1095714.1095803

M3 - Conference contribution

AN - SCOPUS:77956325712

SN - 1595932526

SN - 9781595932525

T3 - Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005

SP - 383

EP - 384

BT - Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005

ER -

Robila S. Distributed computing and computer security education. In Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005. 2005. p. 383-384. (Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005). https://doi.org/10.1145/1095714.1095803