Just Say No to Teaching Ethical Hacking



Similar documents
David Keathly University of North Texas

What You Need to Know About Computer Science, B.S.A.T. Programs

Cyber Security at NSU

Erik Jonsson School of Engineering and Computer Science Interdisciplinary Programs

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE, NORTH CAROLINA FACULTY SENATE

Department of Computer Science and Information Systems

Department of Urban Affairs, Social Science, and Social Work

College of Arts and Sciences

CAPR REPORT - ANNUAL REPORTS SUBMITTTED IN IN COMPLIANCE WITH CAPR 23

School of Computing and Information Sciences

Information Security Attack Tree Modeling for Enhancing Student Learning

B.S. in Information Technology

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Information Science & Technology, B.S.

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE CURRICULUM CHANGE

INVESTIGATE CRIMINAL JUSTICE AT RADFORD UNIVERSITY

Academic Degrees, Majors and Minors: Online

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Computer and Information Science

Prerequisite: Test placement in ENG101 or successful completion of ENG98 if required.

Section 2: Program Summary Economics (CA): Secondary Major and Minor

Department of Computer Science

GRADUATE DEGREE AND CERTIFICATE PROGRAMS

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the Accreditation Cycle

All Professional Engineering Positions, 0800

Nicole N. Hanson, M.A.

Erik Jonsson School of Engineering and Computer Science

UNIVERSITY FACULTY SENATE FORMS

University of Illinois Department of Computer Science Goals, Objectives, and Assessments January 2009

L i s t i n g o f A p p r o p r i a t e T e r m i n a l D e g r e e s,

Florida A&M University Revised New Degree Programs for Strategic Plan (Revised ; 10:03 a.m.)

CLAIRE DONOHUE CURRICULUM VITAE

SPEECH LANGUAGE PATHOLOGY CURRICULUM RE-DESIGN: EMBRACING INTERPROFESSIONAL EDUCATION

L i s t i n g o f A p p r o p r i a t e T e r m i n a l D e g r e e s,

Department Costs Analysis 2/24/2014

ARTICULATION AGREEMENT

CPATH EAE: Extending Contextualized Computing in Multiple Institutions Using Threads. Brooklyn College of the City University of New York (CUNY)

Interdisciplinary Studies

Assessment Progress Report. Assessment of UALR Core Competencies in the Systems Engineering Department

New Program Development on Networking Information Technology

Dean, College of Health and Human Services California State University, Los Angeles

UNIVERSITY FACULTY SENATE FORMS

CSCD 330 Network Programming Winter Lecture 1 - Course Details

Integrating Security into the Curriculum

IT 101 Introduction to Information Technology

EASTERN KENTUCKY UNIVERSITY. Curriculum Proposals

Old Dominion University in partnership with New River Community College. Changing lives. through Opportunity!

October 8, User Conference. Ronald Layne Manager, Data Quality and Data Governance

KENTUCKY STATE UNIVERSITY ORGANIZATION

PROGRAMS. Real. Amazing. Academic Programs. Majors and Degrees. Minor Programs. University Governance UW-PARKSIDE CATALOG

The Department of Industrial and Manufacturing Systems Engineering

INTERDISCIPLINARY AND GENERAL STUDIES

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

BSE General Engineering Degree Program with an Interdisciplinary Professional Focus

College of Arts & Sciences

Computer Science Curriculum Revision

SPRING Dear Prospective Paralegal Student:

Career School Job Openings - Tips For Success

Three year rotational plan for assessing student outcomes: MET

Computer Security and Forensics

ROAD TO SUCCESS. College of Applied Science and Technology. Business & Information Technology

SCHOOL OF ENGINEERING Baccalaureate Study in Engineering Goals and Assessment of Student Learning Outcomes

Computer Information Systems. Information Security AA 150. Luann Keizer, Professor. May 1, 2014

St. Maryʼs College High School Forensic Science

Dean of the College of Science - California State University, Monterey Bay. Dean of the College of Science. Administrator IV

Cybersecurity at ODU ( )

AC : A PROPOSED APPLIED ENGINEERING DEGREE AT EASTERN MICHIGAN UNIVERSITY

A SYSTEMATIC APPROACH FOR DEFINING AND ASSESSING PROGRAM EDUCATIONAL OBJECTIVES AND OUTCOMES

Florida A&M University Revised New Degree Programs for Strategic Plan (Revision approved June 2013)

Thomas E. Pinelli, Ph.D. University Affairs Officer NASA Langley Research Center Hampton, VA

DRAFT. Bachelor of Arts Degrees and Options. Bachelor of Fine Arts Degree and Options. 28 Bachelor of Arts Degrees, 57 Options

The USNA Cyber Program

Cisco Network Specialist CCNA

SOUTHERN UNIVERSITY AT NEW ORLEANS Substantive Change Policy

Computer Science Program Bylaws

TOWARDS STANDARDS IN DIGITAL FORENSICS EDUCATION

CURRICULUM FOR THE BACHELOR OF APPLIED SCIENCES IN CRIMINAL JUSTICE LAW ENFORCEMENT EMPHASIS

Program Approval Form

(BACHELOR) BS In Political Science And Public Admin

CURRICULUM FOR THE BACHELOR OF SCIENCE IN CRIMINAL JUSTICE HOMELAND SECURITY EMPHASIS

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

ARTICULATION AGREEMENT Harford Community College Associate of Science Degree in Chemistry. and

Course Outline Routine Review Process and Procedures

INFORMATION TECHNOLOGY (IT) 515

Educational Leadership Policy Standards: ISLLC as adopted by the National Policy Board for Educational Administration on December 12, 2007

Assessing the State of Undergraduate Education in Urban Planning

1) Chemical Engg. PEOs & POs Programme Educational Objectives

Information Technology An Academic Discipline

Computer Engineering (COE) PROGRAM LEARNING OUTCOMES (10/19/09) Students completing the Computer Engineering program should be able to demonstrate:

ACADEMIC ALERT #

UNO COLLEGE OF INFORMATION SCIENCE & TECHNOLOGY

Human Services, Criminal Justice Concentration Articulation Agreement between Dakota College Bottineau and Valley City State University

Legal and Ethical Aspects of Computer Hacking

PROGRAM INDEX. Degree/Program Requirements CATALOG. UndergraduateMajor

Network Security: A Case Study

Memorandum of Understanding and Articulation Agreement Pertaining to the Bachelors of Science Degree in Electrical Engineering

PROGRAMME DETAIL SPECIFICATION. Programme Summary

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

ACADEMIC APPOINTMENTS

Transcription:

Just Say No to Teaching Ethical Hacking Gail Finley Department of Computer Science and Information Technology University of the District of Columbia January 22, 2009 Hampton University 1

Institution Only public institution of higher education in the District of Columbia and an HBCU Urban land grant institution Established in 1977 from the merger of: Federal City College 4 year, est. 1968 Washington Technical Inst. 2 year, est. 1968 DC Teachers College est. 1955 Miner Teachers College 1851, 1879, 1929 Wilson Teachers College 1873, 1913, 1929

Organization President \ Provost and VP Academic Affairs David A Clark School of Law College of Arts and Sciences Divisions: Arts and Education; Science and Mathematics; Urban Affairs, Behavioral and Social Sciences School of Business and Public Policy School of Engineering and Applied Sciences Department of Engineering, Architecture and Aerospace Technology Department of Computer Science and Information Technology Department of Electrical Engineering

Students and Faculty Total of approx.6000 students Ethnic mix reflects the city: 73 % African American and 6 % Hispanic Departmental Data Majors estimate: 220 Full time faculty: 9

Faculty David Barnett Cisco program Gail Finley IA Education Bggyund Yu Sensor Networks Sheraly Zeadally Wireless networks

CS \IT Program Performance Expectations computer scientists should be prepared to work in a broad range of positions involving tasks from theoretical work to software development information technology professionals should be able to work effectively at planning, implementation, configuration, and maintenance of an organization s computing infrastructure ACM Computing Curriculum 2005 Overview Report, p27

CS \IT Security Requirements Common graduation outcomes for all computing programs understanding of security IT goes further in specific curriculum requirements for topics in Information assurance and security ABET 2007 2008 Criteria for Accrediting Computing Programs

BS Information Technology at UDC Shared beginning programming courses Core areas: Networking Database Web Technologies Required concentration in one core area Required application domain\s

BS Information Technology (cont d) Interdisciplinary application domain/s supporting: Networking and database development Business courses in management, accounting and finance Forensics Criminal justice courses covering rules of evidence, courtroom protocol, law and privacy issues ; possible coordination with our law school Web technologies Graphic design courses

AAS Computer Science Technology Two year degree program as of December 1, the two year program has shifted to a newly formed Community College Options: Intended articulation with BS degrees Networking Software

BS CS /IT Information Assurance Courses Computer Networking CS\IT Network Security CS\IT Secure Computing Systems New Course not yet offered CS Digital Forensics New Course not yet offered IT

Professional Ethics Course Professional Ethics 200 level course Prior to this single course, ethics and societal issues were to be covered in several courses throughout the curriculum Textbook: The Gift of Fire, Baase, Sara

Computer Literacy Computer Concepts and Applications 2 credit lecture, 1 credit lab (meets for two hours) computer security issues: password selection, networks, botnets Expected outcome Increase student awareness on computer security issues from the start

IA Threads Implementation of Information Assurance topics in some BSIT/BSCS courses Operating system Software Engineering Databases

IA Research Additional courses to be developed for a future research concentration in Information Assurance could include: Wireless Security Security Management Computer/Handheld Forensics

Why? Just Say No There are three major concerns when teaching ethical hacking to students

First Concern Concern that we may be teaching dangerous skills to those who are not yet able to make mature decisions about when this is appropriate. A recent study showed one\third of faculty held this concern (Livermore). Some may think that it is just fun Some may consider hacking as a prank

Second Concern Some students, while excellent students, may have backgrounds that would make them unsuitable for such a class There are some who advocate screening students prior to the class. There are privacy issues to screening students prior to a class except for academic issues

Third Concern There is the issue of liability in hacking outside of laboratory experiments. Schools may be held liable. Faculty may be held liable. There are those who advocate that students sign an honor code prior to class.

References Livermore, Jeffery, What are Faculty Attitudes Toward Teaching Ethical Hacking and Penetration Testing?, Proceedings of the 11 th Colloquium fr Information Systems Security Education, Boston University, Boston, MA, June 4 7, 2007. Aycock, John, Heather Crawford and Rennie degraaf, Spamulator: The Internet on a Laptop, ITICSE 08. June 30 July 2, 2008, Madrid Spain.