{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:47Z","timestamp":1750306787795,"version":"3.41.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2013,9]]},"abstract":"<jats:p>Cyber-security is an area in which much curriculum development is taking place; it is important that such efforts be evaluated and shared. We describe three laboratories developed at the United States Naval Academy (USNA) for use in its fundamentals of cyber-security course. All three labs are conducted in a sandboxed virtual environment. Detailed instructor notes, student instructions, worksheets, grading guidance and supporting course software were developed for these labs. In this paper we share our experiences with these labs, assessment and evaluation material, and lessons learned so that others might benefit from our work.<\/jats:p>","DOI":"10.1145\/2505990.2506002","type":"journal-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T12:58:51Z","timestamp":1377608331000},"page":"52-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course"],"prefix":"10.1145","volume":"4","author":[{"given":"Sarah","family":"Standard","sequence":"first","affiliation":[{"name":"United States Naval Academy, Maryland"}]},{"given":"Raymond","family":"Greenlaw","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Maryland"}]},{"given":"Andrew","family":"Phillips","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, Maryland"}]},{"given":"David","family":"Stahl","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Maryland"}]},{"given":"John","family":"Schultz","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Maryland"}]}],"member":"320","published-online":{"date-parts":[[2013,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Anon \"Information Assurance Internship \" http:\/\/iainternship.com\/images\/IA_internships_flyer_2013_v2.pdf 2013. Accessed 2013 July 5.  Anon \"Information Assurance Internship \" http:\/\/iainternship.com\/images\/IA_internships_flyer_2013_v2.pdf 2013. Accessed 2013 July 5."},{"key":"e_1_2_1_2_1","first-page":"63","volume":"3","author":"Brown W. C.","unstructured":"Brown , W. C. Anatomy , Dissection, and Mechanics of an Introductory Cyber-Security Class's Curriculum at the United States Naval Academy.\" ASEE Computers in Education Journal , 3 , 3 (2012): 63 -- 80 . Brown, W. C. et al. \"Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Class's Curriculum at the United States Naval Academy.\" ASEE Computers in Education Journal, 3, 3 (2012): 63--80.","journal-title":"ASEE Computers in Education Journal"},{"key":"e_1_2_1_3_1","volume-title":"Cybersecurity Lab,\" http:\/\/www.cs.umd.edu\/class\/fall2012\/cmsc498L\/","author":"Department of Computer Science","year":"2012","unstructured":"Department of Computer Science , University of Maryland. \"CMSC 498L\/ENEE 459L , Cybersecurity Lab,\" http:\/\/www.cs.umd.edu\/class\/fall2012\/cmsc498L\/ , 2012 . Accessed 2013 July 5. Department of Computer Science, University of Maryland. \"CMSC 498L\/ENEE 459L, Cybersecurity Lab,\" http:\/\/www.cs.umd.edu\/class\/fall2012\/cmsc498L\/, 2012. Accessed 2013 July 5."},{"key":"e_1_2_1_4_1","volume-title":"A Learning Community for Developing Cyber-Security Leaders. The Advanced Course in Engineering on Cyber Security,\" http:\/\/www.cis.syr.edu\/~sueo\/papers\/ace-wecs.pdf","author":"Jabbour K.","year":"2010","unstructured":"Jabbour , K. and Older , S . \" A Learning Community for Developing Cyber-Security Leaders. The Advanced Course in Engineering on Cyber Security,\" http:\/\/www.cis.syr.edu\/~sueo\/papers\/ace-wecs.pdf , 2010 . Accessed 2013 July 5. Jabbour, K. and Older, S. \"A Learning Community for Developing Cyber-Security Leaders. The Advanced Course in Engineering on Cyber Security,\" http:\/\/www.cis.syr.edu\/~sueo\/papers\/ace-wecs.pdf, 2010. Accessed 2013 July 5."},{"key":"e_1_2_1_5_1","volume-title":"May","author":"Obama B.","year":"2009","unstructured":"Obama , B. \" Cyberspace Policy Review : Assuring a Trusted and Resilient Information and Communications Infrastructure.\" http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf , May 2009 . Accessed 2013 July 5. Obama, B. \"Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure.\" http:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf, May 2009. Accessed 2013 July 5."},{"key":"e_1_2_1_6_1","volume-title":"United States Military Academy","author":"Office","year":"2013","unstructured":"Office of the Dean , United States Military Academy , West Point , New York, \"Academic Program : Curriculum and Course Descriptions.\" http:\/\/www.usma.edu\/curriculum\/RedBook\/AY13_RedBook.pdf Accessed 2013 July 5. Office of the Dean, United States Military Academy, West Point, New York, \"Academic Program: Curriculum and Course Descriptions.\" http:\/\/www.usma.edu\/curriculum\/RedBook\/AY13_RedBook.pdf Accessed 2013 July 5."},{"key":"e_1_2_1_7_1","unstructured":"Personal communication from Col. David Gibson the Department Head for Computer Science at USAFA to Raymond Greenlaw.  Personal communication from Col. David Gibson the Department Head for Computer Science at USAFA to Raymond Greenlaw."},{"key":"e_1_2_1_8_1","volume-title":"Diocese of Syracuse, \"Cyber Security K--12 Curriculum.\" http:\/\/www.romecatholic.org\/elementary\/cyber-security-k-12-curriculum","author":"Rome Catholic School","year":"2010","unstructured":"Rome Catholic School , Diocese of Syracuse, \"Cyber Security K--12 Curriculum.\" http:\/\/www.romecatholic.org\/elementary\/cyber-security-k-12-curriculum , 2010 . Accessed 2013 July 5. Rome Catholic School, Diocese of Syracuse, \"Cyber Security K--12 Curriculum.\" http:\/\/www.romecatholic.org\/elementary\/cyber-security-k-12-curriculum, 2010. Accessed 2013 July 5."},{"volume-title":"Department of Information Technology","author":"School","key":"e_1_2_1_9_1","unstructured":"School of Computing , Department of Information Technology , University of South Alabama . \"ITE 476 -- Network Management Security.\" http:\/\/www.southalabama.edu\/bulletin\/courite.htm Accessed 2013 July 5. School of Computing, Department of Information Technology, University of South Alabama. \"ITE 476 -- Network Management Security.\" http:\/\/www.southalabama.edu\/bulletin\/courite.htm Accessed 2013 July 5."},{"key":"e_1_2_1_10_1","unstructured":"USNA \"Introduction to Cyber Security Technical Foundations\" faculty notes. http:\/\/www.usna.edu\/cs\/si110\/ Accessed 2013 July 5.  USNA \"Introduction to Cyber Security Technical Foundations\" faculty notes. http:\/\/www.usna.edu\/cs\/si110\/ Accessed 2013 July 5."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2505990.2506002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2505990.2506002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:17Z","timestamp":1750232057000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2505990.2506002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["10.1145\/2505990.2506002"],"URL":"https:\/\/doi.org\/10.1145\/2505990.2506002","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2013,9]]},"assertion":[{"value":"2013-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}