CS212-M4_DeTanyaBrock_Assessment_4
docx
keyboard_arrow_up
School
Purdue Global University *
*We aren’t endorsed by this school
Course
212
Subject
Philosophy
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by DeanCrow19696
CS212-M4_DeTanyaBrock_Assessment_4
CS212-M4: Thinking Ethically and Critically
Professor: Missy Santman
October 19th, 2023
Professional Code of Ethics Analysis
Ethical hacking, a fundamental part of cybersecurity, plays a critical part in assessing the
security of computer systems and organizations. Ethical hackers are tasked with distinguishing
weaknesses and potential security dangers to safeguard their clients from malicious actors. To
guarantee that ethical hackers stick to exclusive requirements of professionalism and honesty, a
clear-cut code of ethics is central (Jena, 2023). This paper investigates the ethical hacking
profession and analyzes a hypothetical Code of Ethics for Ethical Hackers.
Ethical Hacking and Code of Ethics:
Ethical Hacking is a profession that expects specialists to follow a set of ethical guidelines to
guarantee they direct their work effectively and responsibly. Johansen (2023) and Ec-Council
(2023) identified that the hypothetical Code of Ethics for Ethical Hackers comprises the
following primary points:
Understanding the Client:
Before taking part in any ethical hacking exercises, ethical hackers
should completely comprehend the client association's business, systems, and organizations. This
information guarantees that delicate, confidential, or proprietary data experienced during ethical
hacking is dealt with properly.
Protecting Confidential Information:
Ethical hackers should assess the confidentiality and
privacy of the data they experience during their work. They should guarantee that they violate no
regulations, rules, or guidelines while dealing with individual, monetary, or proprietary
information.
Transparency with the Client:
Ethical hackers are required to maintain transparency with their
clients. They must communicate all relevant findings during the ethical hacking process,
enabling clients to take necessary actions to enhance the security of their systems or networks.
Staying Within Scope:
Ethical hackers must adhere to the agreed-upon scope of work defined
by the client. They should not access areas or components of the system or network beyond what
is specified in the work agreement to minimize exposure of sensitive information and maintain
trustworthiness.
Safeguarding Client Data:
Ethical hackers are restricted from uncovering client data to
outsiders. The privacy and security of the client's delicate information are foremost, as the
essential objective of ethical hacking is to improve the client's system or organization's security.
Benefits of Code of Ethics in Ethical Hacking:
The advantages of a code of ethics in ethical hacking are huge and assist with keeping up with
professionalism and integrity inside the field. The following are two instances of the benefits of
having a code of ethics in ethical hacking explained by PayPal (2022):
Guidance and accountability:
Explicit rules and guidelines are provided for ethical hackers in a
moral hacking implicit code of ethics. When confronted with complex circumstances, it assists
them with settling on insightful choices. For example, the set of principles fills in as a moral
guide, provoking a moral or ethical hacker to report a security weakness to the client as opposed
to taking advantage of it when they find one that might be utilized for individual gain.
Subsequently, ethical hackers are bound to take responsibility for acts and focus on client
security over personal circumstances.
Trust and Reputation:
Following a code of ethics improves the reliability and reputation of
ethical hackers and the associations they work with. Clients and bosses can depend on ethical
hackers to stick to a set of professional standards that focus on their inclinations. For instance, if
an ethical hacker works straightforwardly, conveys discoveries sincerely, and regards client
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
secrecy, they construct a positive reputation in the business, which can prompt additional
opportunities and trust from clients.
Application to an Ethical Issue:
The healthcare sector has numerous weaknesses and wellbeing, or health information is
exceptionally sensible and important. Thus, any harm brought about by malicious intrusions is
especially alarming (Lorenzini et al., 2022). The code of ethics can direct sensible decision-
making concerning healthcare cybersecurity. Two specific instances of how this code of ethics
can be applied are as follows:
Security of Patient Information:
The set of principles underscores the fundamental significance
of protecting patient information, which is profoundly delicate and important. Ethical hackers in
medical care cybersecurity would sensibly go with choices that focus on the security of this
information. For instance, while recognizing weaknesses in a hospital's information system, they
would prescribe encryption measures and access controls to guarantee the privacy of patient
records.
Transparency and Reporting:
The code of ethics encourages ethical hackers to maintain
transparency with healthcare organizations. If they discover a potential security threat, they will
logically decide to report it promptly to the healthcare facility's IT team. This transparent
approach allows for swift mitigation of risks and ensures the continuity of patient care, aligning
with the code's principles.
In short, a distinct code of ethics in the field of ethical hacking isn't just critical but also
hugely helpful. It gives clear rules that lead ethical hackers to use wise judgment, guaranteeing
the security and protection of basic data, as well as keeping up with transparency with clients.
References
Ec-Council. (2023, May 25). Code Of Ethics - CERT. CERT.
https://cert.eccouncil.org/code-of-ethics.html
Jena, B. K. (2023). What is Ethical Hacking? A Comprehensive Guide [Updated].
Simplilearn.com.
https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-ethical-hacking
Johansen, R. (2023). Ethical Hacking Code of Ethics: Security, risk & issues. Panmore Institute.
https://panmore.com/ethical-hacking-code-of-ethics-security-risk-issues
PayPal. (2022, December 27). The role of ethics in hacking: - PayPal 2 - Medium. Medium.
https://medium.com/@p4965502/the-role-of-ethics-in-hacking-d8e3588c2ca5
Lorenzini, G., Shaw, D., & Elger, B. S. (2022). It takes a pirate to know one: ethical hackers for
healthcare cybersecurity. BMC Medical Ethics, 23(1).
https://doi.org/10.1186/s12910-022-00872-y