{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:23:59Z","timestamp":1759091039059,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,9]]},"abstract":"<jats:p>In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to develop the exercises, which have been successfully utilized since spring 2003 to teach cybersecurity basics classes. The experiences and challenges encountered in teaching the course and possible future work are also described.<\/jats:p>","DOI":"10.1145\/1243481.1243486","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Teaching hands-on Linux host computer security"],"prefix":"10.1145","volume":"6","author":[{"given":"Rose","family":"Shumba","sequence":"first","affiliation":[{"name":"Indiana University of Pennsylvania (IUP), Indiana, PA"}]}],"member":"320","published-online":{"date-parts":[[2006,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Barrett D.J. Silverman R.E. and Byrnes R.G. 2003. . . . 1st ed. O'Reilly Media Sebastopol CA.   Barrett D.J. Silverman R.E. and Byrnes R.G. 2003. Linux Security CookBook. 1st ed. O'Reilly Media Sebastopol CA."},{"volume-title":"Staying in Tune with Engineering Education--Proceedings of the 2003 ASEE Annual Conference&amp;Exposition","year":"2003","author":"Davis J.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","unstructured":"Garfinkel S. Spafford G. and Schwartz A. 2003. . . . . . . . . . . . . . . . 3rd ed. O'Reilly Media Sebastopol CA.   Garfinkel S. Spafford G. and Schwartz A. 2003. Practical UNIX&amp;Internet Security. 3rd ed. O'Reilly Media Sebastopol CA."},{"key":"e_1_2_1_4_1","unstructured":"Jackson W. 2002. Cadets keep NSA crackers at bay. Government Computer News (May 20). http:\/\/www.gcn.com\/print\/21_11\/18671-1.html  Jackson W. 2002. Cadets keep NSA crackers at bay. Government Computer News (May 20). http:\/\/www.gcn.com\/print\/21_11\/18671-1.html"},{"key":"e_1_2_1_5_1","unstructured":"Lockhart A. 2004. Network Security Hacks: 100 Industrial Tips and Tools 1st ed. O'Reilly Media Sebastopol CA.   Lockhart A. 2004. Network Security Hacks: 100 Industrial Tips and Tools 1 st ed. O'Reilly Media Sebastopol CA."},{"key":"e_1_2_1_6_1","first-page":"252","volume-title":"Proceedings of the 34th Technical Symposium on Computer Science Education (SIGCSE 2003","author":"Mateti P.","year":"1892"},{"volume-title":"PACISE Pennsylvania Association of Computer and Information Science Educators Conference (California University of PA","year":"2003","author":"Micco M.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563349"},{"key":"e_1_2_1_9_1","unstructured":"Pfleeger C.P. 1989. Security in Computing. Prentice-Hall Englewood Cliffs NJ.   Pfleeger C.P. 1989. Security in Computing. Prentice-Hall Englewood Cliffs NJ."},{"volume-title":"Proceedings of the 35th Technical Symposium on Computer Science Education (SIGCSE","year":"2004","author":"Shumba R.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","unstructured":"Smith P.L. and Ragan T.J. 1999. . . . 2nd ed. Wiley New York.  Smith P.L. and Ragan T.J. 1999. Instructional Design. 2nd ed. Wiley New York."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971438"}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1243481.1243486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:49Z","timestamp":1750258069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1145\/1243481.1243486"],"URL":"https:\/\/doi.org\/10.1145\/1243481.1243486","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"type":"print","value":"1531-4278"},{"type":"electronic","value":"1531-4278"}],"subject":[],"published":{"date-parts":[[2006,9]]},"assertion":[{"value":"2006-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}