Cyber Security Ethics

Spring 2026

Even though this is an introductory course in Computer Security, you will encounter concepts and techniques that could be misused for hacking, penetration, or attacks on computer systems.

Throughout the semester, we will examine a variety of attacks, explorations, and implementations—some of which are significant and potentially dangerous if applied irresponsibly.

While these topics are essential to understanding Computer Security, using them outside a controlled, authorized environment may violate institutional policies as well as local, state, federal, or international laws. Such misuse can carry severe consequences. In some cases, even attempting to probe a system for weaknesses without permission can result in disciplinary action, civil liability, or criminal charges, including expulsion, fines, or imprisonment.

The mere presence of a vulnerability does not justify exploiting it. These matters involve not only professional ethics but also YCP policy and applicable laws. If you are ever unsure about what actions are permissible, consult the instructor before proceeding.

Acting lawfully and ethically is your responsibility. Carefully read the Computer Fraud and Abuse Act CFAA, a federal statute that broadly criminalizes computer intrusion. This is one of several US laws that govern “hacking.” Cyber Criminals are hunted down by FBI, Secret Service *, DOJ and many more.

Understand what the law prohibits — you don’t want to end up like:

Please review Ken Thomson’s Review on Trusting Trust and the college’s policy on Acceptable Use for guidelines concerning proper use of information technology.

* make sure you are not on VPN to read those.

As a member of the College, you are required to abide by these policies.

Name:

Date:

Signature: