At the 2004 IA Workshop, the University of Washington (UW) and Seattle University (SU) presented a student project for cataloging compromised system images, built under the auspices of the Pacific Northwest Honeynet (PNW-honeynet) which is a Honeynet Project Research Alliance member group. [1, 2] Of interest to the workshop audience was not only the functionality of the project itself, but also the method by which it was built—a variation of eXtreme Programming [3]—and how it was taught. This analysis is presented in response to those questions. The pedagogical approach presented in this paper is applicable to the development of any new curriculum or learning experience and is designed to deliver predictable and repeatable student outcomes regardless of the content delivered or background of the instructor.
Revised: October 26, 2010 |
Published: June 17, 2005
Citation
Popovsky B., D.A. Frincke, and C. Seifert. 2005.Adopting eXtreme Programming on a Graduate Student Project. In Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005. IAW '05, 454-455. Piscataway, New Jersey:Institute of Electrical and Electronics Engineers, Inc.PNNL-SA-44945.