|
home—lects—hws
D2L—breeze (snow day)
Originally by Avi Rubin
As part of the course ITEC 345 — Introduction to Computer Security, you will be shown systems, tools and techniques related to Information Security. With proper use, these components allow a security or network administrator to better understand the vulnerabilities and security precautions in effect. Misused, intentionally or accidentally, these components can result in breaches of security, damage to data or other undesirable results.
Since these lab experiments will use RU machines, disk images hosted at RU, and/or resources hosted by providers such as Deterlab.net, you must agree to the following before you can participate. If you are unwilling to sign this form, then you cannot participate in the lab exercises and as a consequence lose points for the lab exercises. (See me if there are specific points which you object to, which can be reworded in a mutually satisfactory way.)
Turn-in instructions: Submit a signed and initialed copy of this form on D2L before starting hw03. You can either:
I agree to:
I agree to NOT:
attempt to gain root access or any other increase in my privilege on any University computing resource or any other computing resource (for which explicit authorization isn’t given).
This includes among other things, editing the virtual image that is being provided to you even if you install it on your own private USB disks or any other storage unit.
E.g. even if you own the WiFi router used by your housemates, and they use your computer (on an account you create for them), that doesn't entitle you to read their documents without their informed consent. If you (say) might review what external hosts try to connect to your router, inform your housemates of what this means, and that you might become aware of the URLs of sites they visit.
Moreover, I am aware and give my explicit consent that my course accounts and systems on deterlab.net and university-owned virtual machines used for ITEC345 may be examined for security and privacy vulnerabilities by other students in the course as part of legitimate class exercises, with the understanding that this may result in information about me being disclosed (if applicable, and restricted to information only on the deterlab.net and itec345 virtual machines). This agreement has been explained to me to my satisfaction. I agree to abide by the conditions of the Code of Ethics and White Hat Agreement.
Signed: Date (YYYY.Mmm.dd):
Printed name:
RU Username:
1 The latest version of RU's document is maintained at www.radford.edu/content/it/home/it-policies.html, which also houses other IT policy standards. ↩
home—lects—hws
D2L—breeze (snow day)
©2013, Ian Barland, Radford University Last modified 2013.Sep.15 (Sun) |
Please mail any suggestions (incl. typos, broken links) to ibarlandradford.edu |