Liaw, Morris2020-09-212020-09-212004• Yang, T., Yue, K., Liaw, M., etc. "Design of Distributed Computer Security Lab", Journal of Computing Sciences in Colleges. Volume 20, Issue 1. October 2004.https://hdl.handle.net/10657.1/2499Across the US and the rest of the world, there exists a lack of computer security components in many CS/IT curricula. For those programs that do have such components in computer security, a common difficulty is to integrate "real-world" labs into the courses, in order to provide hands-on experiences to the learners. Due to concerns for security breaches and network hacking, system administrators are reluctant to allow computer security labs involving network sniffing, virus scripting, etc. to be deployed in the campus network. Without hands-on,real-world projects, it is difficult for the learners to integrate the acquired security theories and knowledge with up-to-date security technologies and practices. Computer science educators who are interested in teaching computer security in a "realistic" context are thus faced with a unique challenge: Setting up 'real-world' computer security laboratories and assignments, without negatively impacting the rest of the campus network. The primary goal of our project is to develop a Distributed Computer Security Lab (DCSL) to answer the challenge. We have established, across multiple university campuses, a computer lab that enables the faculty and students to analyze and study vulnerabilities of a realistic corporate network. The lab provides hands-on experiences for students to study cutting-edge computer security technologies and serves as a testbed for projects which are otherwise impossible to implement in general-purpose labs. In this paper, we first discuss the general model of the DCSL and our implementation, then present a selected set of projects that we have conducted to aid the design of the DCSL The paper concludes with a summary and future work.computer security, computer science students, network hacking, administrators, real-world experiencesDesign of Distributed Computer SecurityArticle