Case Studies in Cybersecurity PDF
Case Studies in Cybersecurity PDF
12-31-2018
Recommended Citation
Cai, Yu (2018) "Using Case Studies To Teach Cybersecurity Courses," Journal of Cybersecurity Education, Research and Practice: Vol.
2018 : No. 2 , Article 3.
Available at: https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3
This Article is brought to you for free and open access by DigitalCommons@Kennesaw State University. It has been accepted for inclusion in Journal of
Cybersecurity Education, Research and Practice by an authorized editor of DigitalCommons@Kennesaw State University. For more information,
please contact [email protected].
Using Case Studies To Teach Cybersecurity Courses
Abstract
This paper introduces a holistic and case-analysis teaching model by integrating case studies into
cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into
the details of these attacks and learn how these attacks took place from the beginning to the end. During the
process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced.
Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be
reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for
teaching cybersecurity. First, the new model can easily draw students’ interests with real-world cases. Second,
the new model can help to teach human and business factors in cybersecurity. Third, the new model can
improve student learning outcomes, particularly helping students gain a holistic view of security.
Keywords
Computer network security, computer science, education, education, security
This article is available in Journal of Cybersecurity Education, Research and Practice: https://digitalcommons.kennesaw.edu/jcerp/
vol2018/iss2/3
Cai: Case Studies in Cybersecurity
INTRODUCTION
People with cybersecurity skills are in great demand as the threat environment
increasingly becomes more complex and challenging. According to workforce
reports by Cisco and Peninsula Press in 2015, there are more than 200k unfilled
cybersecurity jobs in the U.S. alone, and the global figure of unfilled cybersecuri-
ty openings is 1 million. The global demand for cybersecurity professionals will
rise to 6 million by 2019, with a projected shortfall of 1.5 million (Peninsula
Press, 2015; Cisco Report, 2015). The need to have well-trained and well-
prepared cybersecurity workforce is a pressing issue.
However, there are mismatches between industry needs and cybersecurity edu-
cation. For example, even though security is treated as one of the top concerns by
industry, a recent study by CloudPassage in 2016 finds only three of the top fifty
U.S. computer science programs require at least one security course for gradua-
tion (CloudPassage, 2016). The study shows that “there is an incredible IT securi-
ty skills gap... a major root cause is a lack of education and training at accredited
schools”. Another ISACA reports in 2017 finds that less than 25% of cybersecuri-
ty job candidates are qualified (ISACA report, 2016). There is a growing ac-
ceptance among the cybersecurity community that a holistic approach that incor-
porates technical, human and business factors is needed to better train students to
meet industry needs and fill existing IT security skills gaps (LeTellier, V. , 2016).
The core idea of this paper is to explore a new Holistic & Case-Analysis
(HCA) model for cybersecurity education. The new HCA model aims to restruc-
ture cybersecurity courses by integrating and analyzing high-profile cybersecurity
breaches such as the Target breach in 2013 (US Senate Report, 2014), the Anthem
breach in 2015 (Wiki on Anthem, 2015), the Equifax breach in 2017 (Berghel, H.,
2017), a few DDoS attacks (Prince, M., 2013; Margolis et al., 2017), and other
cases. Students will look into the details of these attacks, learn how these attacks
took place from the beginning to the end, understand what security topics are rel-
evant, and study how these attacks could be prevented or stopped. Students will
also be able to replicate some of the breaches in a simulated virtual lab environ-
ment using similar tools and methods described in the case studies. Through guid-
ed in-class discussion, selected readings, and hands-on lab assignments centered
around the case studies, students will explore various cybersecurity offensive and
defensive techniques, and understand best practices and lessons learned in the real
world. During the process of case analysis, students will learn how different sub-
systems interact with each other and obtain a whole picture of integrated cyberse-
curity systems. In addition, socio-technical topics including human and business
factors are introduced during case analysis.
In the new HCA model, we go beyond the traditional case-study approach. For
example, traditionally case studies are used to introduce or illustrate a single secu-
rity topic to students. This traditional case study method is effective but not
enough to help students link multiple and often seemingly unrelated security top-
ics together. In the new HCA model, the entire cybersecurity course, from course
topic selection to course schedule arrangement, from lecture content to lab activi-
ties, are all driven by cybersecurity case studies.
The authors conceived the idea of HCA during the normal process of teaching
cybersecurity and related classes. The HCA model was tested in a cybersecurity
course at Michigan Technology University during the summer/fall semester of
2015 and 2016. The small-scale pilot study shows that the new course is extreme-
ly well received by students. Most students (80%) expressed great interests and
enthusiasm on cybersecurity during and after taking the course by using this HCA
model. More than 30% students indicated that they plan to consider cybersecurity
as career options in the future.
The authors would like to point out that the HCA model is young and may
need refinement. Therefore, the main purpose of this paper is to introduce prelim-
inary results and share findings with the cybersecurity education community.
PROJECT RATIONALE
A holistic or top-down teaching approach focuses on providing students a big
picture or a macro view of a system, then breaking down the system into many
compositional sub-systems. A bottom-up teaching approach begins with the com-
ponent parts of a system and gradually builds up to the whole by piecing together
many sub-systems. Both top-down and bottom-up can be effective teaching meth-
ods, but operate in the opposite direction.
Teaching with case studies is another common pedagogy widely used in many
disciplines (Christensen, 1981; Stanford Newsletter on Teaching, 1994). Study
cases are usually realistic, complex, and context-rich stories used to show the ap-
plication of a theory or concept in real situations. Teaching with cases can help
students actively engage in classroom participation and achieve positive learning
outcomes.
There are three main advantages of the proposed HCA models.
First, the HCA model can increase students’ interests in cybersecurity, thus at-
tracting more students to the cybersecurity field. - "Interest is the best teacher!"
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 2
Cai: Case Studies in Cybersecurity
In summary, we believe that the proposed model has several unique ad-
vantages and can better prepare students for industry needs. Figure 1 compares
the proposed HCA model with the bottom-up model in cybersecurity education.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 4
Cai: Case Studies in Cybersecurity
Third, the HCA model can help instructor select cybersecurity topics to meet
industry needs. Cybersecurity courses (or programs) typically cover a wide range
of topics and evolve at a very fast pace. It is always challenging for instructors to
decide which topics to cover. By utilizing the new model, some timely cybersecu-
rity topics such as email phishing, web security, ransomware, privileged escala-
tion, vulnerability scanning, and privileged account management will be intro-
duced into the new course.
RELATED WORK
Case Study
According to Lawrence, a useful case study is “the vehicle by which a chunk
of reality is brought into the classroom to be worked over by the class and the in-
structor. A good case keeps the class discussion grounded upon some of the stub-
born facts that must be faced in real life situations” (Christensen, 1981). Case
studies have been used widely in higher education fields (Kreber, 2001).
Case study is a commonly used teaching method in computer science educa-
tion. For example, (Baumgartner, 2013) studied using case studies to design and
deliver technology-centered computing education courses. (Cai and Arney, 2017)
introduced case studies in cybersecurity education. (Mitchell et al., 2012) used
case studies to develop a curriculum for communicating parallel and distributed
computing concepts.
Cybersecurity Education
There is a growing pool of efforts on cybersecurity education including teach-
ing pedagogies, curriculum materials, lab platforms, and faculty training.
Several effective teaching pedagogies are developed to improve student learn-
ing outcomes on cybersecurity. For example, hacker curriculum and offensive se-
curity curriculum are presented in (Bratus, 2007; Trabelsi and Ibrahim, 2013).
Cybersecurity hacking competitions / Hackathons are introduced in iCTF (Doupé
et al., 2011), CCDC (NCCDC, 2016) and (Denning et al., 2013).
Other approaches include game-based learning (Jin et al., 2018), project-based
learning (Estes et al., 2016), problem-based learning (Wilson, 2017), and inquiry-
based learning (Kerven et al., 2017). In (Jin et al., 2018), the authors described
their experience of GenCyber summer camp activities in the format of game-
based learning and hands-on labs to stimulate the K-12 stu-dents' interest in the
cybersecurity field and raise their awareness of cybersecurity and safe online be-
havior. In (Wilson, 2017), the authors presented the OWASP project to teach cy-
berse-curity defense through web-based hacking to undergraduate students.
For curriculum materials, the NSF sponsored SEED (Du, 2011) and ITSEED
(Bai and Wang, 2014) project present a set of well-documented security labs. Al-
so, cloud-based virtual lab plat-forms such as EDURange (Weiss et al., 2015) and
DETERlab (Peterson and Reiher, 2010) have been developed for security educa-
tion.
The U.S. government has recognized the importance of cybersecurity with two
efforts. The first effort is the National Initiative for Cybersecurity Education
(NICE) effort led by National Insti-tute of Standards and Technology (NIST), and
the other one is the National Centers of Academ-ic Excellence (CAE) led by Na-
tional Security Agency (NSA) and Department of Homeland Se-curity (DHS).
Information Assurance and Security has been added as a core topic in the
ACM/IEEE Computer Science Curriculum and IT curriculum. There are also con-
tinuing efforts to promote cybersecu-rity education to K-12 teachers and students
(Gorka et al., 2017).
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 6
Cai: Case Studies in Cybersecurity
Figure 2 includes some common network components which are described briefly
below:
Internet: The organization is usually connected to the Internet via dedicated lines,
broadband or 3G/4G, etc.
Router: Usually a Layer-3 network router connecting LAN and WAN networks.
Firewall etc.: Usually includes Firewall, Anti-phishing, Anti-spam, Antivirus, In-
trusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and content
filtering. Sometimes they are called Unified Threat Management Appliance
(UTM).
Core switch: Usually a Layer-3 network switch connecting systems such as Net-
work Area Storage, Wireless Controller, VOIP phone server, VPN server, and
Demilitarized Zone (DMZ).
DMZ Zone: Usually includes computer servers such as ERP, Web Server, Mail
Server, Database Server, and Application Servers.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 8
Cai: Case Studies in Cybersecurity
There are two ways of using the Target case. First, we describe using an in-
class discussion on the Target case during the semester where students answer
questions and have round-table type discussions on the Target breach. Table 2 is a
list of sample discussion questions on the Target case. Second, we use the Target
breach as a real-world example when teaching individual security topics that are
often abstract and can be difficult to conceptualize. Table 3 shows the correspond-
ing security topics at the different stage of the Target case.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 10
Cai: Case Studies in Cybersecurity
8) The security experts criticize Target for failing to isolate sen- 8) Internal firewall and
sitive sections of their networks from those more easily acces- IDS; privileged ac-
sible to outsiders. If you are the Target CTO, please propose a count monitoring; net-
feasible solution to segment and categorize your networks and work segmentation
resources.
9) IT Weaknesses Paved the Way for Target Hackers. Please 9) Open answer
identify as many weaknesses as possible in the Target IT secu-
rity.
10) If you are the Target CIO, what would you do to improve 10) Open answer
IT security?
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 12
Cai: Case Studies in Cybersecurity
a) A video tutorial introducing the case (typically 30-40 minutes): students need to
watch the video and get a basic idea of what happened in the breach before at-
tending the classroom discussion
b) A list of discussion questions (typically ten): students need to finish the discus-
sion questions after watching the video and before attending the classroom dis-
cussion. See Table 2 for example.
c) A PowerPoint presentation with technical details and lessons learned from the
case (typically 30-50 pages): used by the instructor to guide the classroom discus-
sion. Each case study will take one or two lectures, mixed with student discussion
and instructor comment/lecture.
d) Selected readings from publicly available sources to provide students with an
expanded awareness of topics. These selected readings can be either required as-
signment (graded), or optional (ungraded).
Table 5. Cyber breaches for individual topics
Case Studies Corresponding Referencing Links
Topics
4. Mark Zucker- Password manage- https://theringer.com/mark-
berg’s social media ment, human factors zuckerberg-was-hacked-because-hes-
bad-at-passwords-3c38514398b6
accounts were
hacked in 2016.
5. Panama paper Web server security, http://www.forbes.com/sites/jasonblo
breach in 2016. software patch man- omberg/2016/04/21/cybersecurity-
lessons-learned-from-panama-
agement papers-breach/
6. OpenSSL Zero-day attack, https https://en.wikipedia.org/wiki/Heartbl
Heartbleed attack in security, buffer over- eed
2014. flow
7. An Internet-of- DDoS attack, security https://krebsonsecurity.com/2017/12/
Things DDoS attack on Internet-of-Things mirai-iot-botnet-co-authors-plead-
guilty/
on Dyn DNS in
2016.
8. Ransomware on Malware, Ransom- http://arstechnica.com/security/2016/
San Francisco public ware 11/san-francisco-muni-hit-by-black-
friday-ransomware-attack/
transportation in
2016.
9. The JPMorgan Email phishing, end- https://en.wikipedia.org/wiki/2014_J
data breach in 2014. host hardening PMorgan_Chase_data_breach
Case studies in Table 5 typically take 10-20 minutes. The instructors can de-
cide how to use them based on course content. Our plan is to collect as many
high-profile cyber breaches as possible and turn them into usable cases for a cy-
bersecurity course.
Lab assignments
Hands-on lab assignments are an important part of the HCA approach. The
new cybersecurity course has 10 hands-on labs, designed to help student practice
classroom theory and examples in a simulated virtual environment. Each lab ses-
sion is designed to be successfully completed in a 2-hour block. We recommend
using a cloud-based lab platform to provide virtual machines with multiple oper-
ating systems and other technical resources for students and instructors to have
both a consistent and shared platform. Additionally, these virtual machines can be
"quarantined" as to not allow any security research tools to affect other systems.
There are many works in this field such as DETERlab, so we will not focus on the
lab platform and setup.
These labs are designed based on the HCA principle with an emphasis on
providing a simulated lab environment to allow students to mimic real-world
breaches. Students will try to follow the footprint of hackers in high-profile cyber
breaches. Students will explore common offensive and defensive cybersecurity
techniques. Here is a list of lab topics.
Lab 1: Set up virtual machines for lab use
Objectives: get familiar with cloud-based virtual lab platform; be exposed to
Windows and popular Linux distributions including Redhat(Fedora, CentOS),
Kali, Ubuntu, and Debian.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 14
Cai: Case Studies in Cybersecurity
Case study: students will be required to set up a phishing site and send out
phishing emails to mimic the Target data breach.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 16
Cai: Case Studies in Cybersecurity
The grand average of assessment data on topic 1-8 shows slight improvement,
as illustrated in Figure 4. Topic 6 and 7 cover comprehensive offensive and de-
fensive security knowledge. Students show improvement in topic 6 and 7 as illus-
trated in Figure 4. While initial results appear promising, it is too early to attribute
these improvement to the new teaching model. However, considering that the new
HCA model covers more topics and study cases than the traditional model, the
assessment results show that the new model at very least didn’t sacrifice student
performance for additional content and case studies.
Figure 4. Avg of topic 1-8 and avg of topic 6-7 of student content knowledge.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 18
Cai: Case Studies in Cybersecurity
The case studies is one of my favorite parts of this course 4.1 4.0
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 20
Cai: Case Studies in Cybersecurity
CONCLUSION
This paper presents an HCA teaching model by dissecting high-profile cyber-
security breaches to teach cybersecurity courses. The successful outcomes of the
proposed project has the potential to improve cybersecurity education. The case
study materials developed in this project can be adapted and used in many other
cybersecurity courses. The new HCA model will help to bridge the existing gaps
between university education and industry need for real-world and practical un-
derstanding on cybersecuirty.
With the encouraging initial results, there are still many questions left open as
stated in this paper. Therefore, furture analysis and assessments are needed to
demonstate successful innovation in cybersecurity education through the proposed
HCA model.
REFERENCES
Baumgartner, I. (2013), Using case studies to design and deliver technology-centered computing
education courses: An innovative approach from an undergraduate information systems pro-
gram in singapore, in ‘Proceedings of the 18th ACM Conference on Innovation and Technol-
ogy in Computer Science Education’, ITiCSE ’13
Bai, Y. and Wang, X. (2014). ITSEED: hands-on labs for it security education. In Proceedings of
the 45th ACM technical symposium on Computer science education.
Berghel, H. (2017). Equifax and the latest round of identity theft roulette. Computer, 50(12):72–
76.
Blackhat USA (2013). Lessons from surviving a 300gbps denial of service attack. Available at
https://www.youtube.com/watch?v=w04ZAXftQ_Y.
Bratus, S. (2007). What hackers learn that the rest of us don’t: Notes on hacker curriculum. IEEE
Security & Privacy, 5:72–75.
Cai, Y. & Arney, T. (2017), Cybersecurity should be taught top-down and case-driven, in ‘Pro-
ceedings of ACM SIGITE’.
Christensen, C. R. (1981), Teaching By the Case Method, Harvard Business School, Boston, Mas-
sachusetts.
Cisco Report. (2015). Mitigating the cybersecurity skills shortage. Available at http://-
www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf.
CloudPassage (2016). Cloudpassage study finds u.s. universities failing in cybersecurity educa-
tion. Available at https://www.cloudpassage.com/company/press-releases/cloudpassage-
study-finds-u-s-universities-failing-cybersecurity-education/.
Denning, T., Lerner, A., Shostack, A., and Kohno, T. (2013). Control-alt-hack: The design and
evaluation of a card game for computer security awareness and education. In Proceedings of
the 2013 ACM SIGSAC Conference on Computer & Communications Security, pages 915–
928.
Doupé, A., Egele, M., Caillat, B., Stringhini, G., Yakin, G., Zand, A., Cavedon, L., and Vigna,
G. (2011). Hit ’em where it hurts: A live security exercise on cyber situational awareness. In
Proceedings of the 27th Annual Computer Security Applications Conference, pages 51–61.
Du, W. (2011). SEED: Hands-on lab exercises for computer security education. IEEE Security &
Privacy, 9:70–73.
Estes, T., Finocchiaro, J., Blair, J., Robison, J., Dalme, J., Emana, M., Jenkins, L. & Sobiesk, E.
(2016), A capstone design project for teaching cybersecurity to non-technical users, in ‘Pro-
ceedings of the 17th Annual Conference on Information Technology Education’, SIGITE ’16,
ACM, New York, NY, USA, pp. 142–147.
Gorka, S., McNett, A., Miller, J. R. & Webb, B. M. (2017), Improving the pipeline: After-school
program for preparing information assurance and cyber defense professionals, in ‘Proceedings
of the 18th Annual Conference on Information Technology Education’, SIGITE ’17, ACM,
New York, NY, USA, pp. 167–167.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 22
Cai: Case Studies in Cybersecurity
Jin, G., Tu, M., Kim, T.-H., Heffron, J. & White, J. (2018), Game based cybersecurity training for
high school students, in ‘Proceedings of the 49th ACM Technical Symposium on Computer
Science Education’, SIGCSE ’18, ACM, New York, NY, USA, pp. 68–73.
Kerven, D., Nagel, K., Smith, S., Abraham, S. & Young, L. (2017), Scenario-based inquiry for
engagement in general education computing, in ‘Proceedings of the 2017 ACM SIGCSE
Technical Symposium on Computer Science Education’, SIGCSE ’17, ACM, New York, NY,
USA, pp. 303–308.
Kreber, C. (2001), ‘Learning experientially through case studies? a conceptual analysis’, Teaching
in Higher Education 6(2), 217–228.
Margolis, J., Oh, T. T., Jadhav, S., Jeong, J. P., Kim, Y. H., and Kim, J. N. (2017). Analysis and
impact of iot malware. In Proceedings of the 18th Annual Conference on Information Tech-
nology Education, SIGITE ’17, pages 187–187, New York, NY, USA. ACM
Mitchell, J. E., Qiu, J., Canonio, M., Jha, S., Hayden, L., O’Leary, B. A., Figueiredo, R. & Fox, G.
(2012), Futuregrid education: Using case studies to develop a curriculum for communicating
parallel and distributed computing concepts, in ‘Proceedings of the 1st Conference of the Ex-
treme Science and Engineering Discovery Environment: Bridging from the eXtreme to the
Campus and Beyond’, XSEDE ’12, ACM, New York, NY, USA, pp. 61:1–61:5.
Hult News. (2015), ‘Experience is the best teacher : A case in point’. Available at http://-
www.hult.edu/news/experience-is-the-best-teacher/.
Peterson, P. A. H. and Reiher, P. L. (2010). Security exercises for the online classroom with deter.
In Proceedings of the 3rd International Conference on Cyber Security Experimentation and
Test, pages 1–8.
Peninsula Press. (2015). Demand to fill cybersecurity jobs booming. Available at http://-
nsulapress.com/2015/03/31/cybersecurity-jobs-growth/.
Prince, M. (2013). Lessons from surviving a 300gbps denial of service attack. Blackhat USA.
Stanford University Newsletter on Teaching (1994), ‘Teaching with case studies’. Available at
https://web.stanford.edu/dept/CTL/Newsletter/case_studies.pdf.
Trabelsi, Z. and Ibrahim, W. (2013). Teaching ethical hacking in information security curriculum:
A case study. In Proceedings of the 2013 IEEE Global Engineering Education Conference
(EDUCON).
US Senate Report (2014). A kill chain analysis of the 2013 target data breach.
Wilson, B. (2017), ‘Teaching security defense through web-based hacking at the undergraduate
level’, J. Comput. Sci. Coll. 33(2), 121–128.
Weiss, R. S., Boesen, S., Sullivan, J. F., Locasto, M. E., Mache, J., and Nilsen, E. (2015). Teach-
ing cybersecurity analysis skills in the cloud. In Proceedings of the 46th ACM Technical
Symposium on Computer Science Education, pages 332–337.
https://digitalcommons.kennesaw.edu/jcerp/vol2018/iss2/3 24