Advertisement

Ethical Dilemmas in Teaching Computer and Internet Security

Conference paper
  • 567 Downloads
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 41)

Abstract

This paper could be subtitled "Are we teaching the next generation of computer criminals and internet terrorists"? This issue was raised by the Security Services as part of the collaborative network meeting in the area of IT Forensics and Data Analysis hosted by City University. These are valid concerns about the nature of material taught to computer science students in the area of security.

The questions are also important ethical dilemmas for any professional working in the computer and internet security field. These are also applicable when discussing such security risks with the media, members of the public and even legislators. Information on vulnerabilities has to be presented so that it informs programmers and computer users about the areas of risk, but without providing recipes for them to use to conduct criminal activities or mischief themselves.

The paper will look at several case studies from the curriculum at the University of Hull at both undergraduate and postgraduate level. Some specific problem areas of email forgery, security of the Windows operating system and exploitation of buffer overflows, and deception in online auctions, will be explored.

Keywords

Security Teaching Ethics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boyd, C.: Profile: Gary McKinnon, BBC News Online (30 July 2008), http://news.bbc.co.uk/1/hi/technology/4715612.stm
  2. 2.
    BBC News: Estonia fines man for ‘cyber war’, BBC News Online (25 January 2008), http://news.bbc.co.uk/1/hi/technology/7208511.stm
  3. 3.
    Gont, F.: Security Assessment of the Internet Protocol, CPNI (July 2008), http://www.cpni.gov.uk/Docs/InternetProtocol.pdf
  4. 4.
    CPNI: Security Assessment of the Transmission Control Protocol, CPNI Technical Note 3/2009 (2009), http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
  5. 5.
    Trusted Computing Group: Trusted Platform Module (2009), http://www.trustedcomputinggroup.org/developers/trusted_platform_module
  6. 6.
    Li, H.K.: Security Ethics, Letter to the Editor, IT Now, British Computer Society, p. 32 (May 2009)Google Scholar
  7. 7.
    Wanigaratne, S.: Teaching Security, Letter to the Editor, IT Now, British Computer Society, p. 32 (July 2009)Google Scholar
  8. 8.
    House of Lords Science and Technology Committee: Personal Internet Security, 5th Report of Session 2006-07, HL Paper 165, TSO (2007)Google Scholar
  9. 9.
    House of Lords Science and Technology Committee: Personal Internet Security: Follow-up, 4th Report of Session 2007-2008, HL Paper 131, TSO (2008)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of HullUnited Kingdom

Personalised recommendations