Module 3 - 01-2 Flashcards
Ethics in Cybersecurity
Define Security Ethics
Guidelines for making appropriate decisions as a security professional
Explain Ethics as a security professional
- Ethically, as a security professional, your job is to remain unbiased and maintain security and confidentiality.
- Your responsibility and obligation is to adhere to the policies and protocols you’ve been trained to follow.
- Security teams are entrusted with greater access to data and information than other employees.
- Security professionals must respect that privilege and act ethically at all times.
- You should never abuse the access you’ve been granted and entrusted with.
What are some Ethical Principles (3)?
1) Confidentiality ;
2) Privacy Protections ;
3) Laws
Define Confidentiality
Only authorized users can access specific assets or data
How does Confidentiality apply to ethics?
- As a security professional, you’ll encounter proprietary or private information, such as PII. It’s your ethical duty to keep that information confidential and safe.
- There needs to be a high level of respect for privacy to safeguard private assets and data.
- Ethical violation can result in serious consequences, including reprimands, the loss of your professional reputation, and legal repercussions.
Define Privacy Protection
Safeguarding personal information from unauthorized use
How does Privacy Protection apply to ethics?
As a security analyst, your role is to follow the policies and procedures set by your company
Define Law
Rules that are recognized by a community and enforced by a governing entity
How does Law apply to ethics?
As a security professional, you will have an ethical obligation to protect your organization, its internal infrastructure, and the people involved with the organization.
How to apply Law to Ethics (4)
- You must remain unbiased and conduct your work honestly, responsibly, and with the highest respect for the law.
- Be transparent and just, and rely on evidence.
- Ensure that you are consistently invested in the work you are doing, so you can appropriately and ethically address issues that arise.
- Stay informed and strive to advance your skills, so you can contribute to the betterment of the cyber landscape.
True or False?
In the U.S., deploying a counterattack on a threat actor is illegal?
True
- In the U.S., deploying a counterattack on a threat actor is illegal because of laws like the Computer Fraud and Abuse Act of 1986 and the Cybersecurity Information Sharing Act of 2015, among others.
- You can only defend.
- The act of counterattacking in the U.S. is perceived as an act of vigilantism.
- Only individuals in the U.S. who are allowed to counterattack are approved employees of the federal government or military personnel.
Define Vigilante
A person who is not a member of law enforcement who decides to stop a crime on their own
Define Hacktivist
A person who uses hacking to achieve a political goal.
The political goal may be to promote social change or civil disobedience.
What does ICJ stand for?
The International Court of Justice (ICJ)
What are ICJ’s standpoint on counterattacks (4)?
A person or group can counterattack if:
* The counterattack will only affect the party that attacked first.
* The counterattack is a direct communication asking the initial attacker to stop.
* The counterattack does not escalate the situation.
* The counterattack effects can be reversed.