Advertisement

Identification and Integration of Information Security Topics

Applied in a Web Application Programming Course
  • Justin Brown
Chapter
  • 224 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)

Abstract

This paper discusses a unit of university study running within an Internet Computing degree aimed at second year undergraduate students. The unit is preparing for an update of the teaching material. Recent rises in security holes in web technologies has prompted the unit author to identify the critical security concepts that should be taught to web application developers and how such material can be integrated into a 12 week teaching schedule. Current course materials are examined, as are issues in teaching both theoretical and practical concepts of information security within a lecture/workshop arrangement.

Key words

Internet World Wide Web Application Development Programming Security Hacking Hackers Vulnerability Education University 

References

  1. 1.
    Bollefer, T, Chander, G, Johansson, J, Kass, M and Olson, E. (2002). Building and Configuring More Secure Web Sites. Microsoft Corporation. Retrieved December 29, 2002, fromhttp://msdn.microsoft.com/library/en-us/dnnetsec/html/openhack.asp Google Scholar
  2. 2.
    Dyck, T. (2002). OpenHack Wrap. eWeek. Retrieved January 5, 2003, from http://www.eweek.com/article2/0,3959,743411,00.asp Google Scholar
  3. 3.
    Goldsborough, R. (2001 Nov 22). Protecting yourself against cyberterrorism. Black Issues in Higher Education18(20), p52. Retrieved December 19, 2002, from ProQuest Database. Google Scholar
  4. 4.
    Olsen, F. (2000). Logging in with…Thomas J. Talleur. The Chronicle of Higher Education46(45), p A40. Retrieved December 27, 2002, from ProQuest Database. Google Scholar
  5. 5.
    Posey, B. (2002, August 29). Basic strategies for securing Internet Information Server, CNETAsia. Retrieved December 30, 2002, fromhttp://asia. cnet.com/itmanager/trends/0,39006409,39073946–2,00.htm
  6. 6.
    Trembly, A. (2002 Dec 16). Security woes go from bad to worse. National Underwriter106(50), p18–21. Retrieved January 4, 2003, from ProQuest Database Google Scholar
  7. 7.
    UK Security Online. (2002). Hacker Threat Analysed. UK Security Online. Retrieved January 3, 2003, from http://www.uksecurityonline.com/threat/hackers.php Google Scholar
  8. 8.
    Wagner, J. (2002 Oct 22). Web Vandalism on the Rise. Internetnews.com. Retrieved December 15, 2002, from http://www.Internetnews.com/dev-news/article.php/1485601 Google Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Justin Brown
    • 1
  1. 1.KAPUSA

Personalised recommendations