B1. Ethics in Cyber Security
B1. Ethics in Cyber Security
What is Ethics?
• Ethics typically refers to a set of principles or standards that guide
individuals or groups in determining what is right or wrong, good or
bad behavior in a particular context or society.
• Ethics often involve considerations of fairness, justice, honesty, and
responsibility.
• They can be derived from various sources such as religious beliefs,
philosophical theories, cultural norms, or professional codes of
conduct.
What is Morality?
• Morality, on the other hand, pertains to an individual's personal
beliefs about right and wrong behavior.
• It often involves deeply held convictions about what is morally
permissible or impermissible based on one's values, upbringing, and
personal experiences.
• Morality influences how individuals make decisions and navigate
ethical dilemmas in their lives.
Ethics vs Morality
Ethics Morality
The word Ethics originated from the Greek word ethos. The word Morals originated from the Latin word Mos. The
The meaning of ethos is a character. meaning of Mos is custom.
Legal guidelines and professional rules govern ethics. The When it comes to the acceptability of morality it
acceptability of ethics is confined within a particular transcends the norms laid down by culture.
space and time frame.
Ethics are dependent on the prism of others. Morality is seen from the perspective of an individual.
If the contexts are different, then the ethics could be Change in morality depends on the difference in the
different. Hence there is some degree of flexibility in beliefs of an individual.
ethics.
Ethics vs Morality
Ethics Morality
Ethics are followed because society has decided it is the Morality is followed because a person believes that it is
right course of action. the right course of action.
A person who follows the ethical principles need not There could be situations where a moral person violates
necessarily have strong moral values, in fact, there are ethics to maintain to uphold his moral values.
even possibilities that he may not have any morals.
Ethics is something usually associated in the field of law, Morality has a religious connotation.
medicine or business. Ethics does not have a religious
connotation.
What’s Cybersecurity Ethics?
• The ethical computer user policy ensures all users are informed of the
rules and, by agreeing to use the system on that basis, consent to
abide by the rules
Ethical Computer Use Policy
• Information is a valuable corporate asset
• The CIO is steward of corporate information
• The CIO is responsible for information access
• The CIO is responsible for preventing information destruction
• The CIO is responsible for information management practices and
policies
• The CIO must execute the information management policies
Information Privacy Policy
• The unethical use of information typically occurs “unintentionally”
when it is used for new purposes
• Anti-spam policy – simply states that email users will not send
unsolicited emails (or spam)
Types of Cybersecurity Ethical Issues
• For cybersecurity professionals, keeping systems secure often means using
privileged access to data to perform activities such as white hat hacking,
also known as ethical hacking. White hat hacking describes penetrating
protected systems using hacking tools and techniques to test the security of
systems, networks and software. The aim is to identify security
vulnerabilities. Cybersecurity research to learn how to break through the
safeguards of a system enables cybersecurity professionals to build
defenses against them.
• White hat hacking offers an example of cybersecurity ethical issues in the
profession. A white hat hacker must be trustworthy enough to safeguard
the confidentiality of the information they encounter, but there have also
been notable incidents in which security professionals discovered crimes
or public threats that they decided to share with authorities. A solid ethical
foundation can serve as the bedrock to help employees make the right
decisions as they face some key cybersecurity ethical issues, as listed below.
Harm to Privacy
• Confidentiality
• Cybersecurity professionals handle sensitive information, from personal
customer data to a business’s proprietary information. Disclosing this
data can have severe consequences, so cybersecurity professionals must
never reveal confidential information, unless a significant public benefit
exists for doing so.
Cont.
• Threats and Risks
• Cybersecurity professionals are duty-bound to respond to cyber threats.
Remaining vigilant is always a priority, and their response is crucial. While
individuals may overlook notifications or leave their computers unattended,
cybersecurity experts should never do so.