Evaluating ethical decision making and computer use
Communications of the ACM
A proposal for a computer security course
ACM SIGCSE Bulletin
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
Experiences with developing a computer security information assurance curriculum
Journal of Computing Sciences in Colleges
The challenges of designing lab exercises for a curriculum in computer security
Journal of Computing Sciences in Colleges
Ethical responsibilities and legal liabilities of network security professionals
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
An undergraduate track in computer security
Proceedings of the 8th annual conference on Innovation and technology in computer science education
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
The blunderdome: an offensive exercise for building network, systems, and web security awareness
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning
Proceedings of the 2011 Information Security Curriculum Development Conference
Using network packet generators and snort rules for teaching denial of service attacks
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
Switch's CAM table poisoning attack: hands-on lab exercises for network security education
ACE '12 Proceedings of the Fourteenth Australasian Computing Education Conference - Volume 123
Hi-index | 0.00 |
Many undergraduate courses in Networking and Computer Security have adopted curricula involving sensitive security related details such as the hands-on use of network probing tools and password crackers, specific examples of virus and worm related code, and intimate details of security flaws such as buffer overflows. This paper looks at the ethical and legal issues involved in colleges and universities sponsoring such curricula.