As a professional scientist, as a computer security person and educator, I worry about cheating. It’s easy to fool yourself, to think your results are significant when they simply are not and much of scientific ethics and the scientific method exists to catch these issues. In many ways the apprenticeship that graduate students serve is to teach them about the fundamental honesty that is absolutely needed in science. You throw the dice, get an experimental result and if it doesn’t agree with your pet hypothesis – you live with it. I like to say “I don’t gamble for mere money”.
Cheating is a different issue in the real world. Computer security issues are not usually direct attacks on an established protocol but cheats based on human frailty. No one expects to break a username/password combination by exhaustive trial and error (at least not until they have the /etc/shadow file :->), but people break into machines all the time by trying common combinations of usernames and passwords. (I must admit the people who use root or administrator with Yahweh deserve the fruit of their blasphemy).
I was reading an interesting book on cheating, “how to cheat at everything” by Simon Lovell. (you can find it on amazon). There are a fair number of combinatorial problems where the odds are different than one would naively expect – these will be homework for my security class. Some of the hustles are simply magic tricks gone astray, but many of them involve a level of brazenness that is breathtaking. It really reinforces the inherent sneaky streak that any good computer security person needs. Between palming a small mirror to see the cards as you deal, marking only a few cards (for example the face cards for poker or the low cards) to give an edge on your betting, and using slight of hand to swap dice between ones with two sixes and normal ones there isn’t much a dedicated cheat won’t do to fleece his mark. Even my favorite Nigerian scams make an appearance. It’s a good read.