Acceptable Use Policy for Virtual CyberSecurity Lab
ACCEPTABLE USE POLICY FOR VIRTUAL CYBERSECURITY LAB
You have been granted credentials to the PBSC cybersecurity lab Virtual Private
Network and exclusive access to the virtual windows and Linux machines available.
Please be reminded that the use of these resources is conditional with your adherence
to this acceptable use policy . Failure to adhere to these conditions may result in
your privilege being removed.
As a PBSC Student, by typing your name below you agree to:
- Only access the designated virtual machine and not other available computer in the network.
- Understand that every student will be registered to a specific virtual machine and be responsible for any traffic coming or going from it.
- For hacking, capture the flag and penetration testing exercises only attack on the designated target and no other system.
- Use Kali attacking tools and resources responsibly ,adhering to codes of ethics and making sure that no other systems are affected.
- Not to send any network traffic outside the cyberlab (ex to servers, routers or computers in internet ).
- Understand that internet access may be disabled and access to a Kali machine may be only for purposes of getting to know the system, its tools and practice in selective targets already designated by Faculty or cyberlab manager.
- Not to use resources for any illegal activity or not related to the given tasks (downloading music, browsing illegal or offensive sites, cyberbullying, cyberattack and others).
- Understand that all systems and network traffic are monitored 24-7 and every action is traceable to a specific machine & student. Any cybercrime attempt will be reported to FBI immediately.
- Users should not install any software or make any modification to the virtual machine unless has been approved by the lab manager.