week 6

docx

School

Strayer University *

*We aren’t endorsed by this school

Course

MISC

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by cally2k

Report
Running Head: Cybersecurity Ethics Paper CSCI 233 E THICS FOR C OMPUTER S CIENCE Cybersecurity Ethics Paper D R . Cheryl Beauchamp W EEK 6
2 Cybersecurity Ethics Paper Cyber Attacks on U.S. territory and throughout the world have been an ongoing issue since the invention of technology. It has been recommended that The U.S. government should conduct a national debate and discussion about cyberattack policy, which should include Congress, the professional military, and the intelligence agencies. I agree with this recommendation, and it will be good to have several different outlooks on cybersecurity from various sources that deal with it differently. I also believe this issue should be solved internally. We never know who our enemies are in the future, as well as enemies pretending to be allies. Within all the participating parties, we should have enough intel to discuss threats locally and abroad. A cybersecurity board that includes all participating parties needs to be created. Within this group, all cybersecurity threats that are high value should be discussed, and each representative should state how they affect their branch and how they feel it affects the U.S. as a whole. The other parties should communicate if they agree or disagree and why. Once enough intel and data have been received, there should be common interests and threats noted between all parties. Any threat that need attention and can cause immediate problems to the U.S. should be turned into a Plan Of Action Milestone (POAM), which includes problems, fix action, and the time it will take to implement. Based on these policies, procedures and regulations should be drafted to enforce the requirements needed to continue to close the vulnerabilities. What are the benefits to using this type of CNA? Cyber Attacks come in many forms and varieties and are all dangerous when even an attempt is made. One of the most devasting cyber attacks that can be made is one in the financial
3 Cybersecurity Ethics Paper sector. According to an article by the Center for Strategic & International Studies, the financial target are primary targets for cyber attacks. The financial industry is a great place to focus on because everything is funded in one way or another. Politicians need funds for campaigns; if their funding is manipulated in favor of their opponent, governments can be rigged, and people can be placed in power that doesn't deserve it. If finances get removed from the military sector, weapons, ships, and military infrastructures cant be built or repaired, lowering defense systems. Money is involved in everything and everywhere and has become a necessity in our way of life. An attack on the financial sector can also prevent people and governments from doing harm. You take away the target's financial backbone; they won't be able to afford the tools they need, nor will they have the resources to perform their attacks. Is this type of attack a "limited" attack or are there further reaching effects for the country that is attacked? Financial Sector cyber attacks are very dangerous, and they can affect multiple targets simultaneously with no limit. If not stopped or corrected, an attack on the financial sector can spread like a virus; imagine a scenario where a branch is compromised. The episode goes on for a few hours then the hackers shut the bank down and move on to the central bank. From there, hackers start to affect other branches. To make things worse, the hackers gain access to the Federal Reserve, which now attacks the private and government sector. This attack can affect countries. For example, if the stock market crash, all the foreign countries who invested in the U.S. market will lose money, and they too will have to figure out how to cover their assets. This can cause an economic crash as well; inflation will rise to cover lost funds, and businesses will close due to not being able to keep up with payments for rent and an increase in products. The
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Cybersecurity Ethics Paper military will fall behind on defense repairs, new research, and other items needed to defend our economy. These examples are how an attack on the financial sector can spread to other countries, industries, and places. Is it OK to use a CNA as a first-line, preventative attack? Be sure to include supporting evidence from both Biblical Scripture and Professional Code of Ethics Using a CNA as a first-line preventative should be done on a case-by-case basis. Ethically, I think it is wrong because you are using your skills to attack and cause harm, which the Association for Computing Machinery (ACM) tells us not to do. Biblical the Bible tells us not to seek revenge but instead to trust in God. Leviticus 19:18 " You shall not take vengeance or bear a grudge against the sons of your own people, but you shall love your neighbor as yourself: I am the L ORD ." ( ESV new christian's Bible: English standard version 2019) However, the Bible does state to protect ourselves and our own. Luke 11:21 " When a strong man, fully armed, guards his own palace, his goods are safe;." ( ESV new christian's Bible: English standard version 2019) Reading and understanding this, I don't believe we as Christians are supposed to attack others to prevent an attack, but I, as a family man, feel obligated to protect my own, so if we have intel that we will get a cyber attack which can harm lives I believe we have to do our best to protect each other by any means necessary. Being in the military, I know if there is intel that harm will come to the U.S, we will defend our country even if it comes to us striking first to prevent innocent lives from being taken
5 Cybersecurity Ethics Paper Reference \ ACM Code of Ethics and Professional Conduct. Code of Ethics. (2018, June 22). Retrieved November 6, 2022, from https://www.acm.org/code-of-ethics Crossway. (2019). Esv new Christian's Bible: English standard version. Financial sector cybersecurity. Financial Sector Cybersecurity | Center for Strategic and International Studies. (2015, July 17). Retrieved December 3, 2022, from https://www.csis.org/programs/strategic-technologies-program/archives/cybersecurity-and- governance/financial-sector Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. (2009). https://doi.org/10.17226/12651