The Community for Technology Leaders
2009 42nd Hawaii International Conference on System Sciences (2009)
Waikoloa, Big Island, Hawaii
Jan. 5, 2009 to Jan. 8, 2009
ISBN: 978-0-7695-3450-3
pp: 1-10
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of the current isolated and remote access labs that institutions could use as models to minimize the effort required to create or access a working computer security lab without investing the years of effort that the original creators did. Laboratory attributes investigated include scalability, access capabilities, teaching environments, time requirements, and cost requirements. Additionally a discussion of the challenges associated with each environment is presented. Finally, a model for sharing remote access laboratory capabilities is delineated as an alternative for programs for which the creation of a local remote access lab would not be cost effective and some future investigation areas are identified.

R. Dodge, K. Nance, S. Burd, B. Hay, A. Seazzu and J. Wrubel, "Replicating and Sharing Computer Security Laboratory Environments," 2009 42nd Hawaii International Conference on System Sciences(HICSS), Waikoloa, Big Island, Hawaii, 1899, pp. 1-10.
93 ms
(Ver 3.3 (11022016))