Week 11 Flashcards
What is the Utilitarian Approach in ethics?
The most ethical choice produces the greatest good for the greatest number.
This is a form of consequentialism.
What does the Right Approach in ethics emphasize?
The individual’s right to choose for herself or himself, which should be respected.
What is the Common Good Approach in ethics?
Choices that benefit the entire community.
What is confidentiality in the context of cyber security?
A key ethical issue where security professionals access personal, private, or proprietary information that should remain confidential.
What are the protocols for ethical hacking?
- Stay legal: Obtain proper approval
- Define the scope: Determine assessment boundaries
- Report vulnerabilities: Notify organization of discovered vulnerabilities
- Respect data sensitivity: Agree to non-disclosure agreements if needed.
What are the limitations of ethical hacking?
- Limited scope
- Resource constraints
- Restricted methods.
What skills should an ethical hacker possess?
- Expertise in scripting languages
- Proficiency in operating systems
- Thorough knowledge of networking
- Solid foundation in information security principles.