This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
nov_2016 [2017/04/21 19:29] silvio.biagioni@unitn.it |
nov_2016 [2021/01/29 10:58] (current) |
||
---|---|---|---|
Line 2: | Line 2: | ||
- | This page provides additional resources to describe the flat and the segmented network scenarios of our experiment. | + | This page provides additional resources that enable replication of our experiment with MSc students. See the [[validation_of_risk_and_security_requirements_methodologies|main page]] for our work on empirical validation of security risk assessment methods and other experiments. |
==== Goal ==== | ==== Goal ==== | ||
Line 11: | Line 10: | ||
==== Subjects ==== | ==== Subjects ==== | ||
- | The experiment was conducted at the University of Trento in November 2016 as part of the Security Engineering course. The partecipants were 29 MSc students in Computer Science. | + | The experiment was conducted at the University of Trento in November 2016 as part of the Cyber Security Risk Assessment course. The participants were 29 MSc students in Computer Science. |
- | The experiment took place in a single computer laboratory. The experiment was presented as a laboratory activity and only the high-level goal of the experiment was mentioned. The experimental hypotheses were not revealed so as not to influence the partecipants, but they were informed about the procedure. | + | The experiment took place in a single computer laboratory. The experiment was presented as a laboratory activity and only the high-level goal of the experiment was mentioned. The experimental hypotheses were not revealed so as not to influence the participants, but they were informed about the procedure. |
==== Application Scenarios ==== | ==== Application Scenarios ==== | ||
Line 18: | Line 17: | ||
==== Supplement Materials ==== | ==== Supplement Materials ==== | ||
- | Here are the materials that our participants received depending on the assigned treatment: | + | Here are the materials that our participants received: |
- | * Flat Network {{teaching_activities:flatnetwork.pdf|PDF}}. | + | * Flat Network Description {{teaching_activities:flatnetwork.pdf|PDF}}. |
- | * Segmented Network {{teaching_activities:segmentednetwork.pdf|PDF}}. | + | * Segmented Network Description {{teaching_activities:segmentednetwork.pdf|PDF}}. |
| |