Topic area | Unauthorized Access (Intrusion) |
Target audience | Computer Science Majors and Minors |
Activity type | Reading articles provided, filling worksheet, class discussion. |
Time required |
|
Attachments | Worksheet |
Articles Provided |
http://www.cnn.com/TECH/computing/9906/01/hackers/index.html |
Background needed to complete the assignment | Students are to be given articles describing intruders and inrusion. No particular knowledge / skills are needed. |
References |
|
Last modified | August 1999 |
The articles given in the reading assignment discuss two persons who intruded into computers. One of these persons used the intrusion to commit more crimes whereas the other person did it appreantly for no obvious goals. These articles were selected to let the students know how unauthorized access can turn people into criminals. The references show that it is not difficult to detect intrusion due to newer and better methods that are available free. One of the reference articles also shows that intruder can be taken to the court and there is guidance available on how to develop the case against the intruder.
Goals for the activity:
Additional remarks:
None.
Author contact information:
Junaid Ahmed Zubairi
SUNY College at Fredonia
Fredonia, NY 14063
zubairi@cs.fredonia.edu