[go: up one dir, main page]

Reference Hub11
Ethical Hacking in Information Security Curricula

Ethical Hacking in Information Security Curricula

Zouheir Trabelsi, Margaret McCoey
Copyright: © 2016 |Volume: 12 |Issue: 1 |Pages: 10
ISSN: 1550-1876|EISSN: 1550-1337|EISBN13: 9781466689121|DOI: 10.4018/IJICTE.2016010101
Cite Article Cite Article

MLA

Trabelsi, Zouheir, and Margaret McCoey. "Ethical Hacking in Information Security Curricula." IJICTE vol.12, no.1 2016: pp.1-10. http://doi.org/10.4018/IJICTE.2016010101

APA

Trabelsi, Z. & McCoey, M. (2016). Ethical Hacking in Information Security Curricula. International Journal of Information and Communication Technology Education (IJICTE), 12(1), 1-10. http://doi.org/10.4018/IJICTE.2016010101

Chicago

Trabelsi, Zouheir, and Margaret McCoey. "Ethical Hacking in Information Security Curricula," International Journal of Information and Communication Technology Education (IJICTE) 12, no.1: 1-10. http://doi.org/10.4018/IJICTE.2016010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on lab exercises which focus on attacking systems. The paper includes the ethical implications associated with including such labs. The discussion is informed by analyses of log data on student malicious activities, and student survey results. The examination of student behavior after acquiring these skills demonstrates that there is potentially a high risk of inappropriate and illegal behavior associated with this type learning. While acknowledging these risks and problems, the paper recommends that curricula should opt for a teaching approach that offers students both offensive and defensive hands-on lab exercises in conjunction with lecture material. The authors propose steps to minimize the risk of inappropriate behavior and reduce institutional liability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.