CSCI 2070 Introduction to Computer Ethics and CyberSecurity

advertisement
CSCI 2070 Introduction to Computer Ethics and CyberSecurity
Dr. Joy Reed
Fall 2007
[ Version created: Oct 22, 2007 ]
Prerequisite: ENGL 3720 and either CSCI 1302 or ITEC 1310
Course Description:
Study of ethical and security considerations for computer professionals and
users. Topics include issues of privacy, intellectual property rights, and
cybercrime.
Goal:
To foster in students the ability to recognize and respond to ethical
situations and cyber security issues involving computing devices of all forms.
Texts:
CyberEthics Morality and Law in CyberSpace, 3rd edition, Richard A. Spinello, Jones
and Bartlett, 2006.
and
Information Security Illuminated Michael Solomon and Mike Chapple, Jones and
Bartlett, 2005.
Instructors Name:
Office Number:
Class:
Office Hours:
Dr. Joy Reed, Joy.Reed@cs.armstrong.edu
SC 111
M,W 4:30-5:45, Gamble 201
M,W 10:00-12:00noon, 2:00-3:00pm
T 11:00 - 12:00noon
Other times available by appointment
Web URL: http://cs.armstrong.edu/joy
1
Assessment:
Grade Policy:
40% Assignments (10% each)
20% Hour exam 1
20% Hour exam 2
20% Final exam (take-home)
There will be two writing assignments (papers) and two presentation assignments. At
least one of the presentations will be a group assignment.
Your writing assignments (papers) will require thoughtful and well-supported discussion
of assigned topics, and use of the Internet. Details of your paper assignments will be
provided in the coming weeks.
For all written assignments you are required to turn in a word-processed document.
Grading criteria for written work address both technical substance and writing style.
Technical aspects of the work should demonstrate clarity of thought, relevancy, adequate
breadth and depth of topic, appropriate details and examples. Writing style will be
evaluated with respect to purpose, structure, and grammar. Assignments are due by the
end of class on the appointed day. Assignments turned in after class are subject to a 20%
penalty per day (excluding weekends).
Use a word processor for your written assignments and take advantage of the spell-check
and grammar-check capability. Recall that automated grammar checking does not ensure
good style, though it can find careless errors. Hand-written assignments will be given a
ZERO.
Presentation assignments will be given as Powerpoint presentations during class. All
students are required to be present during the presentations. Students who miss class
during presentations will be charged with a 5% penalty to their presentation grade.
Details for presentation assignments will be provided in the coming weeks.
Email: I sometimes send necessary information to the class as a whole using SHIP email. Thus,
please set up a forward on your student email account if you use a different email
address.
Class Etiquette: Please try not to be late or leave early, but if it is necessary, please inform me
beforehand. I reserve the right to refuse this privilege. Cell phones should be completely
turned off.
2
Tentative List of Topics:
1.
Computer Ethics
1.1
1.2
1.3
1.4
1.5
1.6
1.7
2.
Professionalism
2.1
2.2
2.3
2.4
Introduction to Computer Ethics
Historical development of computer systems and their
impact on society
Characterization of computer ethics and ethical frameworks
Informal and Formal Guidelines
Legal issues
Relationship between Ethics and Law
Ethics and Privacy
Computing-related professional societies: IEEE and ACM
Professional codes of conduct
Whistle Blowing
Case-Studies – Including Therac-25
3.
Digital Liability
3.1 Privacy and Data Protection
3.2 Legislation
3.3 Electronic Records Management (ERM)
3.4 Civil, tort, and criminal law
3.5 Copyright
4.
Computer Security
4.1 Confidentiality, Integrity, Availability, Authentication
4.2 Threats, vulnerabilities, and exploits
4.3 Processing, storage, and transmission of data and
communications
4.4 Role of management and staff for organizational security
4.5 Loss-value models
4.6 Security Assurance
4.7 Models
5.
Secure Use and Defensive Best Practice
5.1 Risk analysis
5.2 Audits
5.3 Technology tools
5.4 Bad practices
5.5 Policies, including Acceptable Use Policies (AUP),
employee responsibilities
5.6 Training and awareness
5.7 Defensive strategy
5.8 Contingency planning
6.
Cyber Crime
6.1 Introduction to Cyber Crime including General Categories
6.2 Hacking and Viruses
6.2 Fraud
6.3 Terrorism
6.4 Digital forensics
3
Tentative Schedule
First half of term: Readings in CyberEthics textbook
Week 1, 8/17: General Intro, Introduction to Chapter 1:
Class not scheduled
Week 2, 8/20: Intro,
Spinello Cyberethics text
Paper 1 assigned
Week 3, 8/27: Chapter 1
Week 4, 9/5: Chapter 2
Paper 1 due Wednesday, Sept 5
Presentations assigned.
Week 5, 9/10: Chapter 3
Week 6, 9/17: Chapter 4
Week 7, 9/24: Presentations
Week 8, 10/1: Chapter 5
Week 9, 10/8: Test
Fall Break: Wed
Second half of term - To Be Announced. Readings primarily taken from Security textbook
Week 10, 10/15: Outside paper: Therac-25 :
http://www.computingcases.org/case_materials/therac/therac_case_intro.html ,
Chapter 1
Week 11, 10/22: Chapter 3 (Monday), ACM and IEEE (Wednesday)
Week 12, 10/29: Film (Monday), Chapter 4 (Wednesday),
Paper 2 due Monday, Oct 29, Presentations assigned (Wednesday).
Week 13, 11/5 : Chapter 7, (something else interesting)
Week 14, 11/12: Chapter 11
Presentations
Week 15, 11/19: Thanksgiving holiday: Wed
Week 16, 11/25: Presentations
Week 17, 12/3: Test (Monday), Last day of class: Wed Dec 5
Final Exam due: Wednesday, December 12 at 5:00pm
4
Download