CSCI 2070 Introduction to Computer Ethics and CyberSecurity Dr. Joy Reed Fall 2007 [ Version created: Oct 22, 2007 ] Prerequisite: ENGL 3720 and either CSCI 1302 or ITEC 1310 Course Description: Study of ethical and security considerations for computer professionals and users. Topics include issues of privacy, intellectual property rights, and cybercrime. Goal: To foster in students the ability to recognize and respond to ethical situations and cyber security issues involving computing devices of all forms. Texts: CyberEthics Morality and Law in CyberSpace, 3rd edition, Richard A. Spinello, Jones and Bartlett, 2006. and Information Security Illuminated Michael Solomon and Mike Chapple, Jones and Bartlett, 2005. Instructors Name: Office Number: Class: Office Hours: Dr. Joy Reed, Joy.Reed@cs.armstrong.edu SC 111 M,W 4:30-5:45, Gamble 201 M,W 10:00-12:00noon, 2:00-3:00pm T 11:00 - 12:00noon Other times available by appointment Web URL: http://cs.armstrong.edu/joy 1 Assessment: Grade Policy: 40% Assignments (10% each) 20% Hour exam 1 20% Hour exam 2 20% Final exam (take-home) There will be two writing assignments (papers) and two presentation assignments. At least one of the presentations will be a group assignment. Your writing assignments (papers) will require thoughtful and well-supported discussion of assigned topics, and use of the Internet. Details of your paper assignments will be provided in the coming weeks. For all written assignments you are required to turn in a word-processed document. Grading criteria for written work address both technical substance and writing style. Technical aspects of the work should demonstrate clarity of thought, relevancy, adequate breadth and depth of topic, appropriate details and examples. Writing style will be evaluated with respect to purpose, structure, and grammar. Assignments are due by the end of class on the appointed day. Assignments turned in after class are subject to a 20% penalty per day (excluding weekends). Use a word processor for your written assignments and take advantage of the spell-check and grammar-check capability. Recall that automated grammar checking does not ensure good style, though it can find careless errors. Hand-written assignments will be given a ZERO. Presentation assignments will be given as Powerpoint presentations during class. All students are required to be present during the presentations. Students who miss class during presentations will be charged with a 5% penalty to their presentation grade. Details for presentation assignments will be provided in the coming weeks. Email: I sometimes send necessary information to the class as a whole using SHIP email. Thus, please set up a forward on your student email account if you use a different email address. Class Etiquette: Please try not to be late or leave early, but if it is necessary, please inform me beforehand. I reserve the right to refuse this privilege. Cell phones should be completely turned off. 2 Tentative List of Topics: 1. Computer Ethics 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Professionalism 2.1 2.2 2.3 2.4 Introduction to Computer Ethics Historical development of computer systems and their impact on society Characterization of computer ethics and ethical frameworks Informal and Formal Guidelines Legal issues Relationship between Ethics and Law Ethics and Privacy Computing-related professional societies: IEEE and ACM Professional codes of conduct Whistle Blowing Case-Studies – Including Therac-25 3. Digital Liability 3.1 Privacy and Data Protection 3.2 Legislation 3.3 Electronic Records Management (ERM) 3.4 Civil, tort, and criminal law 3.5 Copyright 4. Computer Security 4.1 Confidentiality, Integrity, Availability, Authentication 4.2 Threats, vulnerabilities, and exploits 4.3 Processing, storage, and transmission of data and communications 4.4 Role of management and staff for organizational security 4.5 Loss-value models 4.6 Security Assurance 4.7 Models 5. Secure Use and Defensive Best Practice 5.1 Risk analysis 5.2 Audits 5.3 Technology tools 5.4 Bad practices 5.5 Policies, including Acceptable Use Policies (AUP), employee responsibilities 5.6 Training and awareness 5.7 Defensive strategy 5.8 Contingency planning 6. Cyber Crime 6.1 Introduction to Cyber Crime including General Categories 6.2 Hacking and Viruses 6.2 Fraud 6.3 Terrorism 6.4 Digital forensics 3 Tentative Schedule First half of term: Readings in CyberEthics textbook Week 1, 8/17: General Intro, Introduction to Chapter 1: Class not scheduled Week 2, 8/20: Intro, Spinello Cyberethics text Paper 1 assigned Week 3, 8/27: Chapter 1 Week 4, 9/5: Chapter 2 Paper 1 due Wednesday, Sept 5 Presentations assigned. Week 5, 9/10: Chapter 3 Week 6, 9/17: Chapter 4 Week 7, 9/24: Presentations Week 8, 10/1: Chapter 5 Week 9, 10/8: Test Fall Break: Wed Second half of term - To Be Announced. Readings primarily taken from Security textbook Week 10, 10/15: Outside paper: Therac-25 : http://www.computingcases.org/case_materials/therac/therac_case_intro.html , Chapter 1 Week 11, 10/22: Chapter 3 (Monday), ACM and IEEE (Wednesday) Week 12, 10/29: Film (Monday), Chapter 4 (Wednesday), Paper 2 due Monday, Oct 29, Presentations assigned (Wednesday). Week 13, 11/5 : Chapter 7, (something else interesting) Week 14, 11/12: Chapter 11 Presentations Week 15, 11/19: Thanksgiving holiday: Wed Week 16, 11/25: Presentations Week 17, 12/3: Test (Monday), Last day of class: Wed Dec 5 Final Exam due: Wednesday, December 12 at 5:00pm 4