Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses
DOI:
https://doi.org/10.13052/jcsm2245-1439.335Keywords:
Information security training, Personal Denial of Service Attack, Cyber EthicsAbstract
The authors examine the need to provide basic information security and cyber ethics training for all university students, not just those pursuing an information security-related degree. The authors also discuss the need to include ethical hacking, as part of an emphasis on cyber ethics, into information security degree programs. Both of these topics are discussed within the context of a new category of cyber crime, a Personal Denial of Service Attack (PDOS) that the authors have identified, along with other types of cyber crime, that are endemic to university campuses.
Downloads
References
F. Cohen, ‘Computer Viruses’, Doctoral Dissertation, University of Southern California, 1985.
M. Zenko, ‘Admiral Michael Mullen: Farewell and Thank You’, Retrieved from http://globalpublicsquare.blogs.cnn.com/2011/09/29/ admiral-michael-mullen-farewell-and-thank-you/ on May 29, 2014, 2011.
White House, ‘The Comprehensive National Cybersecurity Initiative’, Retrieved from http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative on 29 May 2014, 2012.
National Security Administration, ‘National Centers of Academic Excellence’, Retrieved from http://www.nsa.gov/ia/academic_outreach/ nat_cae/index.shtml on 29 May 2014, 2013.
M. Bartolacci, L. LeBlanc, A. Podhradsky, ‘Personal Denial Of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime’, Journal of Digital Forensics, Security and Law, In Print, 2014.
L. Cohen, M. Felson, ‘Social change and crime rate trends: A routine activity approach’, American Sociological Review, 588–608, 1979.
Privacy Rights Clearinghouse, ‘Are You Being Stalked?’, Retrieved from https://www.privacyrights.org/are-you-being-stalked on 29 May 2014, 2014.
M. Schwartz, ‘Cybersecurity Expert Shortage Puts U.S. A Risk’ Retrieved from www.informationweek.com on May 15, 2014, 2010.
National Security Administration, ‘Criteria for Measurement for CAE / Cyber Operations Retrieved from www.nsa.gov/academia/nat_cae_cyber_ ops/nat_cae_co_criteria.shtml on May 29, 2014, 2012.
T. Cook, G. Conti, D. Raymond, U. Stated, M. Academy, ‘When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat’, Proceedings of the 16th Colloquium for Information Systems Security Education, 61–67, 2012.
S. Bratus, A. Shubina, M. Locasto, ‘Teaching the Principles of the Hacker Curriculum to Undergraduates’, 31st ACM Technical Symposium on Computer Science Education, ACM, doi:10.1145/1734263.1734303.
D. Carnevale, ‘Basic Training for Anti-Hackers: An intensive summer program drills students on cybersecurity skills’, Chronicle of Higher Education, 2, 5, 2005.
M. White, D. Ph, C. Gregory, L. Cohen, ‘Security Across the Curriculum Using Computer Security to Teach Computer Science Principles’ Internet Beseiged, ACM Press, 1997.
K. Arnett, M. Schmidt, ‘Busting the Ghost in the Machine’, Communications of the ACM, 92–95, 2005.
M. Dornseif, F. Gartner, T. Holtz, M. Mink, ‘An Offensive Approach to Teaching Information Security: Aachen summer school applied IT security’, Technical Report AIB 205.02.
G. Vigna, ‘Teaching Hands-on Network Security: Testbeds and Live Exercises’, Journal of Information Warfare, 2(3), 8–24, 2003.
Z. Trabelsi, W. Ibrahim, ‘A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study’, Journal of Information Technology Education: Innovations in Practice, 12, 299–319, 2013.
M. Curbelo, A. Cruz, A. ‘Faculty Attitudes Toward Teaching Ethical Hacking to Computer and Information Systems Undergraduates Students’, Eleventh LACCEI Latin American and Caribbean Conference for Engineering and Technology - Innovation in Engineering, Technology and Education for Competitiveness and Prosperity, 1–8, 2013
M. AlMalki, M. Al-Falayleh, ‘Ethical Hacking and Security Awareness: An Ounce of prevention is worth a pound of cure’, Proceedings of Secure Abu Dhabi Conference, 2013.
R. Hartley, ‘Ethical Hacking: Teaching Students to Hack?’, Doctoral Dissertation, East Carolina University, 2006.
J. Livermore. ‘What are Faculty Attitudes Toward Teaching Ethical Hacking and Penetration Testing?’, Procedings of the 11th Colloquim for Information System Security Education, 2007.
A. Durant, ‘The Enemy Within’. Business XL, 2007.
T. Wulf, ‘Teaching ethics in undergraduate network’, Consortium for Computing Sciences in College, 19(1), 2003.
D. Gross, ‘Mafiaboy” breaks silence, paints “portrait of a hacker’, CNN.com, Retrieved on May 18, 2014, 2011.
AssociatedPress, ‘Monroe High School Students Caught Changing Grades’ Retrieved from www.KOMONews.com on May 21, 2014, 2014.
M. Birnbaum, J. Johnson, ‘Students at Potomac school hack into computers; grades feared changed’, The Washington Post, 2010.
C. Gofford, ‘Cheating scandal: Newport-Mesa official resigns to protest expulsions’, LA Times, 2014.
R. Wilkins, ‘Grade-altering scheme sends ex-Purdue student to jail, 2nd student sentenced for hacking professors’ computers’, Retrieved from Jconline.com on May 2, 2014, 2014.
H. Blume, S. Ceasar, ‘Teachers union members, parents protest $1-billion iPad plan. Los Angeles Times, 2013.
H. Blume, ‘LAUSD halts home use of iPads for students after devices hacked’, Los Angeles Times, 2013.
A. Watters, ‘Students Are “Hacking” Their School-Issued iPads: Good for Them. The limitations imposed on these devices inhibit students’ natural curiosity’, The Atlantic, 2013.
K. Mitnick, W. Simon, The art of deception: Controlling the human element of security, John Wiley and Sons, 2001.