Class Discussion: What Would You Do?


This activity will give students an opportunity to learn about a major hacking event in-depth and share with the class. This also serves as a way to get students in the class to speak and contribute to the discussion.

As a class looking at how computers are exploited, we will be learning a lot of skills that could be used to access someone’s computer or network without their permission. While all of these skills are easily learned on the Internet, it is important that we agree to respect private property and never access something without permission.

Students need to understand that the material learned in this class should not be used to access files, networks, or other property that they do not have permission to access. Lack of security does not imply permission.


The students will be able to:

  • Discuss ethical behavior in online context
  • Ethical dilemma, gray areas
  • Identify Ten Commandments of Cyber Ethics
  • Describe a major hacking event
  • Identify the vulnerability that led to the attacks
  • Suggest ways to prevent similar attacks
  • Tasks for the Student to Prepare for this Lesson

    Print and sign this document of the ethics statement. Then read this article on the Ten Commandments of Cyber Ethics. For each "commandment" presented, list an example.

    Ethics Scenarios

    Follow along with your instructor and discuss with your classmates the following ethical scenarios related to the Internet. Answer the following questions for each scenario:
  • What would you do?
  • Did the people involved act ethically?
  • Who was harmed in this interaction; who was the victim?
  • Did the behavior violate any of the "Ten Commandments" listed earlier?