1 of 64

SPECIAL TOPIC:

Issues on Cybersecurity Ethics

Version x.x

<Month, Year>

2 of 64

Learning Outcomes:

  • LO1: Understand key ethical challenges in cybersecurity.
  • LO2: Explore real-world ethical dilemmas faced by cybersecurity professionals.
  • LO3: Apply ethical frameworks in decision-making.
  • LO4: Engage in discussions and practical exercises to analyze cybersecurity ethics cases.

2

3 of 64

1- Introduction to Cybersecurity Ethics

  • What is Ethics
    • Trolley Problem
    • Apply it to self-driving cars (Tesla)

  • <Insert Image>

3

4 of 64

Cybersecurity Ethics

Moral principles and standards governing the conduct of cybersecurity professionals and the practices aimed at safeguarding data, computer systems, and networks from unauthorized access, breaches, and attacks.

5 of 64

Cybersecurity Ethics encompasses

  • Integrity
  • Accountability
  • Privacy
  • Fairness
  • Societal well-being

6 of 64

Cybersecurity vs. Cybercrime vs Cyber ethics

Cybersecurity defends systems and data from threats, while cybercrime involves illegal activities using technology, and cyberethics deals with the moral and legal implications of technology use

7 of 64

2.1 Privacy and Data Protection

Ethical Considerations in Data Collection

Informed Consent

  • Obtaining informed consent respects individuals autonomy and their right to control their personal data. Consent should be freely given.

7

8 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Collection

Purpose Limitation

  • Define the purpose for which data is collected and ensure that data usage remains aligned with that purpose.

8

9 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Collection

Data Minimization

  • Emphasizes the importance of collecting only the necessary data and avoiding intrusion into privacy.
  • Limits the potential of data breach and demonstrate respect for individuals privacy

9

10 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Collection

Profiling and Discrimination

  • This arises when data is used to create profiles or make decisions that can impact individuals lives.

10

11 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Storage and Security

Data Breaches

  • In the event of a data breach, organizations should uphold ethical principles such as transparency, accountability, and prompt notification to affected individuals.

11

12 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Storage and Security

Data Retention

  • Retaining the personal data in the appropriate length of time.
  • When data is no longer necessary for its intended purpose, organizations should ensure its secure and irreversible deletion.

12

13 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Sharing Agreements and Third Party Involvement

Data Sharing Agreements

  • It outlines the terms and conditions under which data is shared, establishing clear expectations, regarding data usage, security measures, and compliance with privacy regulations.

13

14 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Sharing Agreements and Third Party Involvement

Vendor Management

  • This arises when organizations engage third-party vendor who have access to personal data.
  • Organizations must ensure that the vendors adhere to the same privacy and security standard upheld by the organization.

14

15 of 64

2.1 Privacy and Data Collection

Ethical Considerations in Data Sharing Agreements and Third Party Involvement

Data Transfers

  • Ensures that appropriate safeguards are in place to protect the data when it is moved to jurisdictions with different privacy standards.

  • <Insert Image>

15

16 of 64

2.1.1 Case Study: Facebook-Cambridge Analytica Scandal

A controversy that exposed the misuse of personal data for political advertising. Cambridge Analytica (CA), a UK-based data analytics firm, obtained Facebook user data without consent and used it to infleunce political campaigns, including those of Ted Cruz, Donald Trump, and the LEave-EU Brexit Campaign.

16

17 of 64

2.1.1 Case Study: Facebook-Cambridge Analytica Scandal

The revelation led to:

  • A $100 billion drop in Facebook’s Market Value.
  • Investigation by the US Federal Trade Commission (FTC) and UK authorities.
  • Facebook CEO Mark Zuckerberg testifying before Congress.

17

18 of 64

2.1.1 Case Study: Facebook-Cambridge Analytica Scandal

Legal & Regulatory Impact

  • GDPR (General Data Protection Regulation) was implemented in May 2018
  • Companies mishandling data faced several fines up to 4% of global revenue.
  • CA’s reputation suffered, leading to its shutdown in May 2018.

18

19 of 64

2.2 Hacking and Ethical Boundaries

WHITE HAT

The “ethical hackers” or “good hackers. They use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers.

BLACK HAT

The criminals who break intro computer networks with malicious intent.

GREY HAT

Often look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem

19

20 of 64

2.2 Hacking and Ethical Boundaries

Responsible Disclosure

  • A process in which security researchers or ethical hackers discover vulnerabilities, weaknesses, or flaws in software, hardware, or systems and report them to the affected organization or vendor.

20

21 of 64

2.2 Hacking and Ethical Boundaries

Unauthorized Access

  • when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner.

21

Reference: (Unauthorized Access, n.d. )

22 of 64

2.2.1 Case Study: Ethical dilemmas in penetration testing

  1. The tension between doing the right thing for the client company (the whole), and the right thing for its staff(the individual)
  2. The tension between choosing a structured and carefully considered strategy (structured), over a strategy that was unstructured and contingent (unstructured)

22

23 of 64

2.3 Government Surveillance and Citizen Rights

Balancing National Security and Individual Privacy

  • Government Surveillance Programs
  • Legal Frameworks and Privacy Laws
  • Technological Innovations and Privacy Challenges
  • Data Collection and Intelligence Gathering
  • International Cooperation and Security

23

24 of 64

2.3.1 Case Study: Edward Snowden and Mass Surveillance

Who is Edward Snowden?

  • Former NSA contractor and CIA employee

  • Whistleblower who leaked classified documents in 2013

24

25 of 64

2.3.1 Case Study: Edward Snowden and Mass Surveillance

What Did Snowden Reveal?

  • U.S. government’s mass surveillance programs

  • NSA’s PRISM program, collecting data from tech companies

  • Global surveillance efforts involving allied intelligence agencies

25

26 of 64

2.3.1 Case Study: Edward Snowden and Mass Surveillance

Why Did Snowden Leak the Information?

  • Believed the public had the right to know about mass surveillance

  • Concern over privacy violations and government overreach

  • Advocated for greater transparency and accountability

26

27 of 64

2.3.1 Case Study: Edward Snowden and Mass Surveillance

Consequences of the Leaks

  • Sparked global debates on privacy vs. security

  • Led to legal reforms, including the USA FREEDOM Act (2015)

  • Strained U.S. diplomatic relations with other countries

27

28 of 64

2.4 AI Automation, and Bias in Cybersecurity

What is Algorithmic Discrimination?

  • Bias in AI systems that leads to unfair treatment of individuals or groups

  • Can occur in hiring, lending, policing, healthcare, and more

  • Often results from biased training data or flawed algorithms

28

29 of 64

2.4 AI Automation, and Bias in Cybersecurity

Causes of Algorithmic Bias

  • Biased training data

  • Flawed algorithm design

  • Lack of diversity in AI development

  • Feedback loops

29

30 of 64

2.4.1 Case Study: AI-driven facial recognition and bias concerns

What is AI-Driven Facial Recognition?

  • Technology that identifies and verifies individuals using facial features

  • Used in law enforcement, security, marketing, and personal devices

  • Relies on machine learning models trained on large datasets

30

31 of 64

2.4.2 Case Study: AI-driven facial recognition and bias concerns

Bias in Facial Recognition Systems

  • Higher error rates for certain racial and gender groups

  • Women are more likely to be misclassified than men

  • Bias stems from imbalanced training datasets that lack diversity

31

32 of 64

2.4.1 Case Study: AI-driven facial recognition and bias concerns

Real-World Consequences of Bias

  • Wrongful arrests

  • Discrimination in security screening

  • Privacy violations

  • Reduced trust in AI

32

33 of 64

2.5 Insider Threats and Whistleblowing

Ethical dilemmas in exposing security flaws in an organization

Loyalty vs. Ethical Responsibility

  • Employees face a moral conflict between staying loyal to their employer and exposing security flaws that could harm users or the public.

  • Whistleblowing can lead to retaliation, job loss, or even legal action, despite ethical intentions.

33

34 of 64

2.5.1 Case Study: Uber’s handling of its data breach

The 2016 Data Breach Incident

  • Hackers accessed personal data of 57 million users and drivers.
  • Uber paid hackers $100,000 to keep the breach secret instead of reporting it.

34

35 of 64

2.5.1 Case Study: Uber’s handling of its data breach

Ethical and Security Lessons

  • The case highlights the dangers of prioritizing reputation over transparency.

  • Companies must have strong cybersecurity policies and ethical disclosure practices to protect users.

35

36 of 64

3.5.1 Ethical Frameworks and Decision-Making

  • Utilitarianism vs. Deontology in Cybersecurity

  • Ethical Guidelines and Standards:
    • ACM Code of Ethics, ISO 27001, GDPR, NIST guidelines

  • Ethical Decision-Making Models:
    • A structured approach to resolving ethical dilemmas

36

37 of 64

3.1.1- Utilitarianism vs. Deontology in Cybersecurity

Utilitarianism

  • Utilitarianism is a consequentialist theory that focuses on maximizing overall happiness or well-being. In cybersecurity, this means making decisions based on outcomes that provide the greatest benefit to the majority.

37

38 of 64

3.1.2- Utilitarianism vs. Deontology in Cybersecurity

Deontology

  • Deontology, rooted in duty-based ethics, emphasizes that actions must follow moral principles, regardless of consequences. In cybersecurity, this means adhering to strict ethical guidelines, even if breaking them could lead to better security outcomes.

38

39 of 64

3.1.3- Pros and Cons Utilitarianism

39

PROS

CONS

Prioritize Overall Happiness

Ignores Individual Rights and Dignity

Promotes Collective Well Being

Overlooks Minority Voices

Justifies invasive security practices (e.g., surveillance) if they lead to greater public safety.

Can justify morally questionable actions (e.g., violating privacy rights for security gains).

Supports ethical hacking when it prevents large scale cyber threats.

Risk of sacrificing individual rights for collective safety.

40 of 64

3.1.4- Pros and Cons Deontology

40

PROS

CONS

Respects Individual Rights

Ignores Consequences

Provides Clear Ethical Guidelines

Conflicting Duties

Builds Trust and Accountability

May Not Always Align with Business Interests

Encourages Compliance with Laws and Standards

Too Rigid in Real-World Scenarios

Protects the vulnerable

Slower Decision-Making

Clear decision-making

41 of 64

3.1.5- Utilitarianism vs. Deontology in Cybersecurity

Utilitarianism

Focuses on maximizing overall benefit, even if it means sacrificing individual rights.

Deontology

Focuses on strict moral rules and duties, regardless of consequences.

Neither approach is perfect. Utilitarianism justifies security measures that protect many, while Deontology ensures ethical limits aren’t crossed. A balanced approach is best in maximizing security while respecting ethical principles.

41

42 of 64

3.2.1- Ethical Guidelines and Standards: (ACM Code of Ethics)

The ACM Code of Ethics and Professional Conduct

  • is a set of ethical principles for computing professionals, established by the Association for Computing Machinery (ACM). It provides guidelines for responsible decision-making in computing-related professions.

42

Reference: ACM

43 of 64

3.2.2- Ethical Guidelines and Standards: (ACM Code of Ethics)

1. General Ethical Principles (Public Interest)

    • Contribute to society and human well-being
    • Avoid harm (minimize risks in computing projects)
    • Be honest and trustworthy
    • Be fair and take action against discrimination
    • Respect privacy and confidentiality

2. Professional Responsibilities

  • Strive for high-quality work
  • Maintain professional competence (continuous learning)
  • Know and respect laws
  • Honor contracts and agreements
  • Give proper credit for work

43

Reference: ACM

44 of 64

3.2.3- Ethical Guidelines and Standards: (ACM Code of Ethics)

3. Professional Leadership Principles

    • Ensure computing benefits all people
    • Support social responsibility
    • Promote ethical decision-making within organizations
    • Encourage responsible technology development

4. Compliance with the Code

  • Uphold and promote the principles
  • Take action against ethical violations

44

Reference: ACM

45 of 64

3.2.4- Ethical Guidelines and Standards: (ISO 27001)

ISO/IEC 27001

  • is an international standard for managing information security risks through a structured Information Security Management System (ISMS). It ensures confidentiality, integrity, and availability (CIA) of information by implementing security controls.

45

Reference: ISO

46 of 64

3.2.5- Ethical Guidelines and Standards: (GDPR)

GDPR (General Data Protection Regulation)

  • is a European Union (EU) data protection law that governs how organizations collect, store, and process personal data. It ensures privacy, transparency, and user control over personal information.

46

Reference: GDPR

47 of 64

3.2.6- Ethical Guidelines and Standards: (GDPR)

Lawfulness, Fairness, and Transparency

  • Data must be processed legally and openly.

Purpose Limitation

  • Data collected for specific, legitimate purposes.

Data Minimization

  • Only necessary data should be collected.

Storage Limitation

  • Data should not be kept longer than needed.

Integrity and Confidentiality

  • Protect data against unauthorized access and breaches.

Accountability

  • Organizations must comply and demonstrate compliance.

Accuracy

  • Personal data must be kept up to date.

47

Reference: GDPR

48 of 64

3.2.7- Ethical Guidelines and Standards: (GDPR)

User Rights Under GDPR

  • Right to Access – Users can request their data.
  • Right to Rectification – Users can correct inaccurate data.
  • Right to Erasure ("Right to be Forgotten") – Users can request data deletion.
  • Right to Data Portability – Users can transfer their data to another service.
  • Right to Object – Users can object to data processing.

48

Reference: GDPR

49 of 64

3.2.8- Ethical Guidelines and Standards: (NIST)

The National Institute of Standards and Technology (NIST)

  • Provides cybersecurity frameworks and guidelines to help organizations manage risks and protect information systems.

49

Reference: NIST

50 of 64

3.2.9- Ethical Guidelines and Standards: (NIST)

1. NIST Cybersecurity Framework (CSF)

  • Identify – Understand assets, risks, and business context.
  • Protect – Implement safeguards (e.g., access controls, encryption).
  • Detect – Monitor for security threats and incidents.
  • Respond – Take action against detected incidents.
  • Recover – Restore systems and ensure resilience.

2. NIST Special Publication (SP) 800 Series

  • SP 800-53 – Security controls for federal information systems.
  • SP 800-171 – Protecting controlled unclassified information (CUI).
  • SP 800-61 – Incident response best practices.

3. NIST Privacy Framework

  • Helps organizations manage privacy risks and ensure data protection.

50

Reference: NIST

51 of 64

3.3- Ethical Decision-Making Models

Ethical Decision-Making Models

    • A structured approach ensures cybersecurity professionals make ethical, fair, and well-reasoned decisions when facing dilemmas.

51

52 of 64

3.3.2- Ethical Decision-Making Models

1. Define the Ethical Problem

  • Clearly identify the issue and who is affected (users, company, public, etc.).

2. Gather Relevant Information

  • Collect facts, laws, policies, and security risks. Identify ethical guidelines (ACM Code of Ethics, ISO 27001, company policies).

52

53 of 64

3.3.3- Ethical Decision-Making Models

3. Identify Stakeholders

  • List all individuals and groups impacted by the decision(employees, customers, government, etc.).

4. Consider Ethical Models

  • Analyze the situation using Utilitarianism, Deontology, and Virtue Ethics.

53

54 of 64

3.3.4- Ethical Decision-Making Models

5. Explore Possible Solutions

  • List alternative actions and weigh their consequences(e.g., disclose the vulnerability, delay disclosure, report anonymously).

6. Make a Decision & Justify It

  • Choose the best solution that balances security, ethics, and business needs.

54

55 of 64

3.3.5- Ethical Decision-Making Models

7. Take Action & Monitor Outcomes

  • Implement the decision and track its impact.

8. Reflect & Document the Process

  • Learn from the case and record findings for future guidance.

55

56 of 64

4- Case Study and Group Discussion

Ethical Dilemma: Insider Threats

A security analyst finds a major vulnerability in their company’s system but is pressured to keep quiet.

56

57 of 64

4- Case Study and Group Discussion

Ethical Dilemma: Insider Threats

Q: What should the analyst do?

A: The analyst should report the vulnerability through the proper internal channels, such as their immediate supervisor, or the IT security team.

57

58 of 64

4- Case Study and Group Discussion

Ethical Dilemma: Insider Threats

Q: What ethical principles apply?

A: The analyst has an ethical responsibility to ensure that the vulnerability is addressed to protect public safety and organizational integrity.

58

59 of 64

4- Case Study and Group Discussion

Ethical Dilemma: Government Backdoor

A government agency requests a cybersecurity firm to install backdoors for surveillance.

59

60 of 64

4- Case Study and Group Discussion

Ethical Dilemma: Government Backdoor

Q: Should the firm comply?

A: the firm should assess the legality of the request, consider ethical implications like privacy and trust, consult with legal and ethics experts, and advocate for transparency where possible.

60

Reference: Backdoor

61 of 64

4- Case Study and Group Discussion

Ethical Dilemma: Government Backdoor

Q: What are the ethical and legal consequences?

A: Ethical consequences include losing people’s trust, risking misuse, and conflicting with professional standards, while legal consequences could involve privacy law violations and liability for misuse.

61

Reference: Backdoor

62 of 64

5- Best Practices and Conclusion (expound sub-topics below)

  • How to Promote Ethical Cybersecurity Practices:
    • Transparent policies, training, and accountability
    • Ethical hacking programs and responsible disclosure policies
  • <Insert Image>

62

Reference: (Title, Year)

* Hyperlink the source

63 of 64

Introduction to Cybersecurity Ethics (expound sub-topics below)

  • Definition of Ethics in Cybersecurity
  • Why Cybersecurity Ethics Matter
    • Trust and integrity in digital systems
    • The impact of ethical failures (e.g., data breaches, misinformation, surveillance abuse)
  • Cybersecurity vs. Cybercrime vs. Cyberethics
  • <Insert Image>

63

Reference: (Title, Year)

* Hyperlink the source

64 of 64

Further Reading

NIST Ethics Guidelines: NIST Cybersecurity Framework

Article: “The Ethical Dilemmas of Cybersecurity” by IEEE

“Ethical Hacking: Key Principles” by EC-Council

“AI and Ethics in Cybersecurity” – Harvard Cybersecurity Journal

ACM Code of Ethics: ACM Ethics Guide

ISO 27001 Ethical Guidelines: ISO 27001 Overview

64