This paper describes how simulation can be used to train systems administrators and managers about computer security threats.

Security Awareness Training Simulation
Download Resources
PDF Accessibility
One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.
This paper describes how simulation can be used to train systems administrators and managers about computer security threats. The advantage of simulation-based training over commercial seminar and lab oriented classes is that a simulation can be customized to resemble the enclave the student is interested in securing. Customization makes the training more relevant to the student and, by factoring out irrelevant topics, allows the student time to explore the effects of relevant hacker attacks in more depth than is possible in typical classes. A proof-of-concept prototype is described, along with the remaining development necessary to accomplish all the training objectives.