CS212-M4_DeTanyaBrock_Assessment_4

docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

212

Subject

Philosophy

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by DeanCrow19696

Report
CS212-M4_DeTanyaBrock_Assessment_4 CS212-M4: Thinking Ethically and Critically Professor: Missy Santman October 19th, 2023
Professional Code of Ethics Analysis Ethical hacking, a fundamental part of cybersecurity, plays a critical part in assessing the security of computer systems and organizations. Ethical hackers are tasked with distinguishing weaknesses and potential security dangers to safeguard their clients from malicious actors. To guarantee that ethical hackers stick to exclusive requirements of professionalism and honesty, a clear-cut code of ethics is central (Jena, 2023). This paper investigates the ethical hacking profession and analyzes a hypothetical Code of Ethics for Ethical Hackers. Ethical Hacking and Code of Ethics: Ethical Hacking is a profession that expects specialists to follow a set of ethical guidelines to guarantee they direct their work effectively and responsibly. Johansen (2023) and Ec-Council (2023) identified that the hypothetical Code of Ethics for Ethical Hackers comprises the following primary points: Understanding the Client: Before taking part in any ethical hacking exercises, ethical hackers should completely comprehend the client association's business, systems, and organizations. This information guarantees that delicate, confidential, or proprietary data experienced during ethical hacking is dealt with properly. Protecting Confidential Information: Ethical hackers should assess the confidentiality and privacy of the data they experience during their work. They should guarantee that they violate no regulations, rules, or guidelines while dealing with individual, monetary, or proprietary information. Transparency with the Client: Ethical hackers are required to maintain transparency with their clients. They must communicate all relevant findings during the ethical hacking process, enabling clients to take necessary actions to enhance the security of their systems or networks.
Staying Within Scope: Ethical hackers must adhere to the agreed-upon scope of work defined by the client. They should not access areas or components of the system or network beyond what is specified in the work agreement to minimize exposure of sensitive information and maintain trustworthiness. Safeguarding Client Data: Ethical hackers are restricted from uncovering client data to outsiders. The privacy and security of the client's delicate information are foremost, as the essential objective of ethical hacking is to improve the client's system or organization's security. Benefits of Code of Ethics in Ethical Hacking: The advantages of a code of ethics in ethical hacking are huge and assist with keeping up with professionalism and integrity inside the field. The following are two instances of the benefits of having a code of ethics in ethical hacking explained by PayPal (2022): Guidance and accountability: Explicit rules and guidelines are provided for ethical hackers in a moral hacking implicit code of ethics. When confronted with complex circumstances, it assists them with settling on insightful choices. For example, the set of principles fills in as a moral guide, provoking a moral or ethical hacker to report a security weakness to the client as opposed to taking advantage of it when they find one that might be utilized for individual gain. Subsequently, ethical hackers are bound to take responsibility for acts and focus on client security over personal circumstances. Trust and Reputation: Following a code of ethics improves the reliability and reputation of ethical hackers and the associations they work with. Clients and bosses can depend on ethical hackers to stick to a set of professional standards that focus on their inclinations. For instance, if an ethical hacker works straightforwardly, conveys discoveries sincerely, and regards client
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
secrecy, they construct a positive reputation in the business, which can prompt additional opportunities and trust from clients. Application to an Ethical Issue: The healthcare sector has numerous weaknesses and wellbeing, or health information is exceptionally sensible and important. Thus, any harm brought about by malicious intrusions is especially alarming (Lorenzini et al., 2022). The code of ethics can direct sensible decision- making concerning healthcare cybersecurity. Two specific instances of how this code of ethics can be applied are as follows: Security of Patient Information: The set of principles underscores the fundamental significance of protecting patient information, which is profoundly delicate and important. Ethical hackers in medical care cybersecurity would sensibly go with choices that focus on the security of this information. For instance, while recognizing weaknesses in a hospital's information system, they would prescribe encryption measures and access controls to guarantee the privacy of patient records. Transparency and Reporting: The code of ethics encourages ethical hackers to maintain transparency with healthcare organizations. If they discover a potential security threat, they will logically decide to report it promptly to the healthcare facility's IT team. This transparent approach allows for swift mitigation of risks and ensures the continuity of patient care, aligning with the code's principles. In short, a distinct code of ethics in the field of ethical hacking isn't just critical but also hugely helpful. It gives clear rules that lead ethical hackers to use wise judgment, guaranteeing the security and protection of basic data, as well as keeping up with transparency with clients.
References Ec-Council. (2023, May 25). Code Of Ethics - CERT. CERT. https://cert.eccouncil.org/code-of-ethics.html Jena, B. K. (2023). What is Ethical Hacking? A Comprehensive Guide [Updated]. Simplilearn.com. https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-ethical-hacking Johansen, R. (2023). Ethical Hacking Code of Ethics: Security, risk & issues. Panmore Institute. https://panmore.com/ethical-hacking-code-of-ethics-security-risk-issues PayPal. (2022, December 27). The role of ethics in hacking: - PayPal 2 - Medium. Medium. https://medium.com/@p4965502/the-role-of-ethics-in-hacking-d8e3588c2ca5 Lorenzini, G., Shaw, D., & Elger, B. S. (2022). It takes a pirate to know one: ethical hackers for healthcare cybersecurity. BMC Medical Ethics, 23(1). https://doi.org/10.1186/s12910-022-00872-y