SPECIAL TOPIC:
Issues on Cybersecurity Ethics
Version x.x
<Month, Year>
Learning Outcomes:
2
1- Introduction to Cybersecurity Ethics
3
Cybersecurity Ethics
Moral principles and standards governing the conduct of cybersecurity professionals and the practices aimed at safeguarding data, computer systems, and networks from unauthorized access, breaches, and attacks.
Cybersecurity Ethics encompasses
Cybersecurity vs. Cybercrime vs Cyber ethics
Cybersecurity defends systems and data from threats, while cybercrime involves illegal activities using technology, and cyberethics deals with the moral and legal implications of technology use
2.1 Privacy and Data Protection
Ethical Considerations in Data Collection
Informed Consent
7
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Collection
Purpose Limitation
8
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Collection
Data Minimization
9
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Collection
Profiling and Discrimination
10
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Storage and Security
Data Breaches
11
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Storage and Security
Data Retention
12
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Sharing Agreements and Third Party Involvement
Data Sharing Agreements
13
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Sharing Agreements and Third Party Involvement
Vendor Management
14
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1 Privacy and Data Collection
Ethical Considerations in Data Sharing Agreements and Third Party Involvement
Data Transfers
15
Reference: (Ethical Considerations in Data Privacy and Security, 2023 )
2.1.1 Case Study: Facebook-Cambridge Analytica Scandal
A controversy that exposed the misuse of personal data for political advertising. Cambridge Analytica (CA), a UK-based data analytics firm, obtained Facebook user data without consent and used it to infleunce political campaigns, including those of Ted Cruz, Donald Trump, and the LEave-EU Brexit Campaign.
16
2.1.1 Case Study: Facebook-Cambridge Analytica Scandal
The revelation led to:
17
2.1.1 Case Study: Facebook-Cambridge Analytica Scandal
Legal & Regulatory Impact
18
2.2 Hacking and Ethical Boundaries
WHITE HAT
The “ethical hackers” or “good hackers. They use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers.
BLACK HAT
The criminals who break intro computer networks with malicious intent.
GREY HAT
Often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem
19
2.2 Hacking and Ethical Boundaries
Responsible Disclosure
20
Reference: (Why You Need Responsible Disclosure and How to Get Started, n.d )
2.2 Hacking and Ethical Boundaries
Unauthorized Access
21
2.2.1 Case Study: Ethical dilemmas in penetration testing
22
2.3 Government Surveillance and Citizen Rights
Balancing National Security and Individual Privacy
23
2.3.1 Case Study: Edward Snowden and Mass Surveillance
Who is Edward Snowden?
24
2.3.1 Case Study: Edward Snowden and Mass Surveillance
What Did Snowden Reveal?
25
2.3.1 Case Study: Edward Snowden and Mass Surveillance
Why Did Snowden Leak the Information?
26
2.3.1 Case Study: Edward Snowden and Mass Surveillance
Consequences of the Leaks
27
2.4 AI Automation, and Bias in Cybersecurity
What is Algorithmic Discrimination?
28
Reference: (What is algorithmic bias?, 2024)
2.4 AI Automation, and Bias in Cybersecurity
Causes of Algorithmic Bias
29
Reference: (What is algorithmic bias?, 2024)
2.4.1 Case Study: AI-driven facial recognition and bias concerns
What is AI-Driven Facial Recognition?
30
2.4.2 Case Study: AI-driven facial recognition and bias concerns
Bias in Facial Recognition Systems
31
2.4.1 Case Study: AI-driven facial recognition and bias concerns
Real-World Consequences of Bias
32
2.5 Insider Threats and Whistleblowing
Ethical dilemmas in exposing security flaws in an organization
Loyalty vs. Ethical Responsibility
33
2.5.1 Case Study: Uber’s handling of its data breach
The 2016 Data Breach Incident
34
2.5.1 Case Study: Uber’s handling of its data breach
Ethical and Security Lessons
35
3.5.1 Ethical Frameworks and Decision-Making
36
3.1.1- Utilitarianism vs. Deontology in Cybersecurity
Utilitarianism
37
Reference:
3.1.2- Utilitarianism vs. Deontology in Cybersecurity
Deontology
38
Reference:
3.1.3- Pros and Cons Utilitarianism
39
Reference:
PROS | CONS |
Prioritize Overall Happiness | Ignores Individual Rights and Dignity |
Promotes Collective Well Being | Overlooks Minority Voices |
Justifies invasive security practices (e.g., surveillance) if they lead to greater public safety. | Can justify morally questionable actions (e.g., violating privacy rights for security gains). |
Supports ethical hacking when it prevents large scale cyber threats. | Risk of sacrificing individual rights for collective safety. |
3.1.4- Pros and Cons Deontology
40
Reference:
PROS | CONS |
Respects Individual Rights | Ignores Consequences |
Provides Clear Ethical Guidelines | Conflicting Duties |
Builds Trust and Accountability | May Not Always Align with Business Interests |
Encourages Compliance with Laws and Standards | Too Rigid in Real-World Scenarios |
Protects the vulnerable | Slower Decision-Making |
Clear decision-making | |
3.1.5- Utilitarianism vs. Deontology in Cybersecurity
Utilitarianism
Focuses on maximizing overall benefit, even if it means sacrificing individual rights.
Deontology
Focuses on strict moral rules and duties, regardless of consequences.
Neither approach is perfect. Utilitarianism justifies security measures that protect many, while Deontology ensures ethical limits aren’t crossed. A balanced approach is best in maximizing security while respecting ethical principles.
41
Reference:
3.2.1- Ethical Guidelines and Standards: (ACM Code of Ethics)
The ACM Code of Ethics and Professional Conduct
42
Reference: ACM
3.2.2- Ethical Guidelines and Standards: (ACM Code of Ethics)
1. General Ethical Principles (Public Interest)
2. Professional Responsibilities
43
Reference: ACM
3.2.3- Ethical Guidelines and Standards: (ACM Code of Ethics)
3. Professional Leadership Principles
4. Compliance with the Code
44
Reference: ACM
3.2.4- Ethical Guidelines and Standards: (ISO 27001)
ISO/IEC 27001
45
Reference: ISO
3.2.5- Ethical Guidelines and Standards: (GDPR)
GDPR (General Data Protection Regulation)
46
Reference: GDPR
3.2.6- Ethical Guidelines and Standards: (GDPR)
Lawfulness, Fairness, and Transparency
Purpose Limitation
Data Minimization
Storage Limitation
Integrity and Confidentiality
Accountability
Accuracy
47
Reference: GDPR
3.2.7- Ethical Guidelines and Standards: (GDPR)
User Rights Under GDPR
48
Reference: GDPR
3.2.8- Ethical Guidelines and Standards: (NIST)
The National Institute of Standards and Technology (NIST)
49
Reference: NIST
3.2.9- Ethical Guidelines and Standards: (NIST)
1. NIST Cybersecurity Framework (CSF)
2. NIST Special Publication (SP) 800 Series
3. NIST Privacy Framework
50
Reference: NIST
3.3- Ethical Decision-Making Models
Ethical Decision-Making Models
51
Reference:
3.3.2- Ethical Decision-Making Models
1. Define the Ethical Problem
2. Gather Relevant Information
52
Reference:
3.3.3- Ethical Decision-Making Models
3. Identify Stakeholders
4. Consider Ethical Models
53
Reference:
3.3.4- Ethical Decision-Making Models
5. Explore Possible Solutions
6. Make a Decision & Justify It
54
Reference:
3.3.5- Ethical Decision-Making Models
7. Take Action & Monitor Outcomes
8. Reflect & Document the Process
55
Reference:
4- Case Study and Group Discussion
Ethical Dilemma: Insider Threats
A security analyst finds a major vulnerability in their company’s system but is pressured to keep quiet.
56
4- Case Study and Group Discussion
Ethical Dilemma: Insider Threats
Q: What should the analyst do?
A: The analyst should report the vulnerability through the proper internal channels, such as their immediate supervisor, or the IT security team.
57
4- Case Study and Group Discussion
Ethical Dilemma: Insider Threats
Q: What ethical principles apply?
A: The analyst has an ethical responsibility to ensure that the vulnerability is addressed to protect public safety and organizational integrity.
58
Reference:
4- Case Study and Group Discussion
Ethical Dilemma: Government Backdoor
A government agency requests a cybersecurity firm to install backdoors for surveillance.
59
4- Case Study and Group Discussion
Ethical Dilemma: Government Backdoor
Q: Should the firm comply?
A: the firm should assess the legality of the request, consider ethical implications like privacy and trust, consult with legal and ethics experts, and advocate for transparency where possible.
60
Reference: Backdoor
4- Case Study and Group Discussion
Ethical Dilemma: Government Backdoor
Q: What are the ethical and legal consequences?
A: Ethical consequences include losing people’s trust, risking misuse, and conflicting with professional standards, while legal consequences could involve privacy law violations and liability for misuse.
61
Reference: Backdoor
5- Best Practices and Conclusion (expound sub-topics below)
62
Reference: (Title, Year)
* Hyperlink the source
Introduction to Cybersecurity Ethics (expound sub-topics below)
63
Reference: (Title, Year)
* Hyperlink the source
Further Reading
NIST Ethics Guidelines: NIST Cybersecurity Framework
Article: “The Ethical Dilemmas of Cybersecurity” by IEEE
“Ethical Hacking: Key Principles” by EC-Council
“AI and Ethics in Cybersecurity” – Harvard Cybersecurity Journal
ACM Code of Ethics: ACM Ethics Guide
ISO 27001 Ethical Guidelines: ISO 27001 Overview
64