Change search
ReferencesLink to record
Permanent link

Direct link
Computer Security Training: A Military Officer Case Study
Swedish National Defence College.ORCID iD: 0000-0002-2677-9759
2008 (English)In: Stockholm Contributions in Military-Technology 2007, Stockholm: Försvarshögskolan (FHS), 2008, 49-64 p.Chapter in book (Refereed)
Abstract [en]

Understanding and dealing with computer security issues is normally considered a key objective for information technology (IT) support personnel. From a broader perspective, however, information-based threats are primarily a concern for managers and superior commanders who need to authorise and initiate the necessary investments and to enforce the appropriate policies and procedures to protect the organisation at hand. Enabling these latter-mentioned superior decision-makers to make well-founded decisions and to make sure the personnel actually conform to the approved procedures and practices require the decision-makers to have at least a fair understanding of computer security fundamentals. For this purpose, the Swedish National Defence College is in the midst of putting together a series of courses within information assurance to fulfil the need of IT training in governmental organisations. This paper presents the course design and the laboratory settings that were used within the first experimental course taught to students becoming high rank officers, i.e., officers elected for the very last two years of education within the curriculum of ordinary Swedish military training. The course looks at computer security from an attack versus defend viewpoint, i.e., computer attacks are studied to learn about prevention and self-defence. The pedagogical challenges related to education of high rank officers or similar personnel are discussed in light of the recently-held course. A standpoint taken is that computer security is best taught using hands-on laboratory experiments focusing on problem solving assignments. This is not undisputed since, e.g., high rank officers are busy people who are not fond of getting stuck learning about the peripherals. Also, it is emphasised that knowledge and tools within computer security by nature serve both the purpose of the attacker and the defender. The difference should be regarded purely as a question regarding intent.

Place, publisher, year, edition, pages
Stockholm: Försvarshögskolan (FHS), 2008. 49-64 p.
, Stockholm Contributions in Military-Technology, ISSN 1654-9775 ; 1
National Category
Computer Science
URN: urn:nbn:se:kth:diva-89596ISBN: 978-91-85401-93-2OAI: diva2:504189
QC 20120313Available from: 2012-02-20 Created: 2012-02-15 Last updated: 2012-03-13Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Brynielsson, Joel
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 17 hits
ReferencesLink to record
Permanent link

Direct link