{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:05:24Z","timestamp":1735585524758},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,14]]},"DOI":"10.1145\/3511861.3511874","type":"proceedings-article","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T23:06:36Z","timestamp":1644447996000},"page":"114-122","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications"],"prefix":"10.1145","author":[{"family":"Sufatrio","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Jan","family":"Vykopal","sequence":"additional","affiliation":[{"name":"Masaryk University, Czechia"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,2,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. TEAMMATES. Retrieved Dec 10 2021 from http:\/\/teammatesv4.appspot.com [n.d.]. TEAMMATES. Retrieved Dec 10 2021 from http:\/\/teammatesv4.appspot.com"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734303"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/572133.572135"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953175"},{"key":"e_1_3_2_1_5_1","volume-title":"What is Penetration Testing?Retrieved","author":"EC-Council","year":"2021","unstructured":"EC-Council . [n.d.]. What is Penetration Testing?Retrieved Dec 10, 2021 from https:\/\/www.eccouncil.org\/what-is-penetration-testing\/ EC-Council. [n.d.]. What is Penetration Testing?Retrieved Dec 10, 2021 from https:\/\/www.eccouncil.org\/what-is-penetration-testing\/"},{"volume-title":"Computing Curricula 2020: Paradigms for Global Computing Education","author":"CC2020\u00a0Task Force","key":"e_1_3_2_1_6_1","unstructured":"CC2020\u00a0Task Force . 2020. Computing Curricula 2020: Paradigms for Global Computing Education . Association for Computing Machinery , New York, NY, USA . CC2020\u00a0Task Force. 2020. Computing Curricula 2020: Paradigms for Global Computing Education. Association for Computing Machinery, New York, NY, USA."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the EDSIG Conference(2017)","author":"Hartley Regina","year":"2017","unstructured":"Regina Hartley , Dawn Medlin , and Zach Houlik . 2017 . Ethical Hacking: Educating Future Cybersecurity Professionals . Proceedings of the EDSIG Conference(2017) . Issue October. http:\/\/proc.iscap.info\/ 2017\/pdf\/4341.pdf Regina Hartley, Dawn Medlin, and Zach Houlik. 2017. Ethical Hacking: Educating Future Cybersecurity Professionals. Proceedings of the EDSIG Conference(2017). Issue October. http:\/\/proc.iscap.info\/2017\/pdf\/4341.pdf"},{"key":"e_1_3_2_1_8_1","volume-title":"INFOSEC Writers","author":"Hartley D","year":"2006","unstructured":"Regina\u00a0 D Hartley . 2006 . Ethical Hacking: Teaching Students to Hack . INFOSEC Writers , November 5 (2006). Regina\u00a0D Hartley. 2006. Ethical Hacking: Teaching Students to Hack. INFOSEC Writers, November 5 (2006)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159584"},{"key":"e_1_3_2_1_10_1","unstructured":"IT Governance. 2019. Penetration Testing and ISO 27001 \u2013 Securing Your ISMS Green Paper. https:\/\/www.itgovernance.co.uk\/green-papers\/penetration-testing-and-iso-27001 IT Governance. 2019. Penetration Testing and ISO 27001 \u2013 Securing Your ISMS Green Paper. https:\/\/www.itgovernance.co.uk\/green-papers\/penetration-testing-and-iso-27001"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341525.3387366"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricular Guideline. http:\/\/cybered.acm.org Joint Task Force on Cybersecurity Education. 2017. Cybersecurity Curricular Guideline. http:\/\/cybered.acm.org","DOI":"10.1145\/3422808"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152893"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366844"},{"key":"e_1_3_2_1_15_1","unstructured":"National Cyber Security Centre. 2017. Penetration Testing. https:\/\/www.ncsc.gov.uk\/guidance\/penetration-testing National Cyber Security Centre. 2017. Penetration Testing. https:\/\/www.ncsc.gov.uk\/guidance\/penetration-testing"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"National Initiative for Cybersecurity Education (NICE). [n.d.].","year":"2021","unstructured":"National Initiative for Cybersecurity Education (NICE). [n.d.]. NICE Framework Specialty Areas and Work Role . Retrieved Dec 10, 2021 from https:\/\/www.nist.gov\/document\/supplementnicespecialtyareasandworkroleksasandtasksxlsx National Initiative for Cybersecurity Education (NICE). [n.d.]. NICE Framework Specialty Areas and Work Role. Retrieved Dec 10, 2021 from https:\/\/www.nist.gov\/document\/supplementnicespecialtyareasandworkroleksasandtasksxlsx"},{"key":"e_1_3_2_1_17_1","unstructured":"Meg Ormiston. 2010. Creating a Digital-Rich Classroom Teaching & Learning in a Web 2.0 World. Solution Tree. Meg Ormiston. 2010. Creating a Digital-Rich Classroom Teaching & Learning in a Web 2.0 World. Solution Tree."},{"key":"e_1_3_2_1_18_1","unstructured":"OWASP. 2014. OWASP Testing Guide 4.0. https:\/\/owasp.org\/www-project-web-security-testing-guide\/assets\/archive\/OWASP_Testing_Guide_v4.pdf OWASP. 2014. OWASP Testing Guide 4.0. https:\/\/owasp.org\/www-project-web-security-testing-guide\/assets\/archive\/OWASP_Testing_Guide_v4.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"OWASP.","year":"2017","unstructured":"OWASP. 2017 . OWASP Top Ten . Retrieved Dec 10, 2021 from https:\/\/owasp.org\/www-project-top-ten OWASP. 2017. OWASP Top Ten. Retrieved Dec 10, 2021 from https:\/\/owasp.org\/www-project-top-ten"},{"key":"e_1_3_2_1_20_1","unstructured":"OWASP. 2019. OWASP Application Security Verification Standard 4.0. https:\/\/owasp.org\/www-project-application-security-verification-standard OWASP. 2019. OWASP Application Security Verification Standard 4.0. https:\/\/owasp.org\/www-project-application-security-verification-standard"},{"key":"e_1_3_2_1_21_1","volume-title":"Special Interest Group","author":"Guidance Penetration Test","year":"2015","unstructured":"Penetration Test Guidance , Special Interest Group , PCI Security Standards Council . 2015 . PCI Data Security Standard (PCI DSS) v1.0. https:\/\/www.pcisecuritystandards.org\/documents\/Penetration_Testing_Guidance_March_2015.pdf Penetration Test Guidance, Special Interest Group, PCI Security Standards Council. 2015. PCI Data Security Standard (PCI DSS) v1.0. https:\/\/www.pcisecuritystandards.org\/documents\/Penetration_Testing_Guidance_March_2015.pdf"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Execution Standard Penetration Testing","year":"2021","unstructured":"Penetration Testing Execution Standard . [n.d.]. PTES Technical Guidelines . Retrieved Dec 10, 2021 from http:\/\/www.pentest-standard.org\/index.php\/PTES_Technical_Guidelines Penetration Testing Execution Standard. [n.d.]. PTES Technical Guidelines. Retrieved Dec 10, 2021 from http:\/\/www.pentest-standard.org\/index.php\/PTES_Technical_Guidelines"},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_1_23_1","unstructured":"PortSwigger. [n.d.]. Burp Suite Professional . Retrieved Dec 10, 2021 from https:\/\/portswigger.net\/burp\/pro PortSwigger. [n.d.]. Burp Suite Professional. Retrieved Dec 10, 2021 from https:\/\/portswigger.net\/burp\/pro"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.7771\/1541-5015.1002"},{"key":"e_1_3_2_1_25_1","unstructured":"School of Education SUNY Oswego. 2011. Conceptual Framework \u2013 Weaving a Transformative School Fabric. https:\/\/www.oswego.edu\/education\/sites\/www.oswego.edu.education\/files\/soe_cf_2011.pdf School of Education SUNY Oswego. 2011. Conceptual Framework \u2013 Weaving a Transformative School Fabric. https:\/\/www.oswego.edu\/education\/sites\/www.oswego.edu.education\/files\/soe_cf_2011.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"Edward Skoudis and Tom Liston. 2005. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd. ed.). Pearson. Edward Skoudis and Tom Liston. 2005. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd. ed.). Pearson."},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Schools Partnership The Great","year":"2013","unstructured":"The Great Schools Partnership , Glossary of Education Reform . 2013 . Authentic Learning . Retrieved Dec 10, 2021 from https:\/\/www.edglossary.org\/authentic-learning\/ The Great Schools Partnership, Glossary of Education Reform. 2013. Authentic Learning. Retrieved Dec 10, 2021 from https:\/\/www.edglossary.org\/authentic-learning\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Penetration Testing: A Hands-On Introduction to Hacking","author":"Weidman Georgia","year":"2014","unstructured":"Georgia Weidman . 2014 . Penetration Testing: A Hands-On Introduction to Hacking . No Starch Press. Georgia Weidman. 2014. Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press."},{"key":"e_1_3_2_1_29_1","unstructured":"Wikipedia. [n.d.]. Penetration Test. Retrieved Dec 10 2021 from https:\/\/en.wikipedia.org\/wiki\/Penetration_test Wikipedia. [n.d.]. Penetration Test. Retrieved Dec 10 2021 from https:\/\/en.wikipedia.org\/wiki\/Penetration_test"}],"event":{"name":"ACE '22: Australasian Computing Education Conference","acronym":"ACE '22","location":"Virtual Event Australia"},"container-title":["Proceedings of the 24th Australasian Computing Education Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511861.3511874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T17:36:12Z","timestamp":1704216972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511861.3511874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":29,"alternative-id":["10.1145\/3511861.3511874","10.1145\/3511861"],"URL":"https:\/\/doi.org\/10.1145\/3511861.3511874","relation":{},"subject":[],"published":{"date-parts":[[2022,2,14]]},"assertion":[{"value":"2022-02-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}