Article review - In Search of Ethical Code for Cybersecurity

Assignment Help Software Engineering
Reference no: EM132161074

Assignment -

Write a review on this article with 2 APA references. Regarding if passive reconnaissance is ethical or not and requires written consent, would venture to say it's based on the details and circumstances involved with the actual client. It's certainly not against the law or unethical to gather or research information that's publicly available.

According to Walker, M. (2017), nothing happens before you have a signed, sealed agreement in place. Nothing. This agreement should spell out the limitations, constraints, and liabilities between the organization and the penetration test team, and is designed to maximize the effectiveness of the test itself while minimizing operational impact. From a hypothetical pen tester vantage point, we would want to gather as much publicly available information about my client in advance to advise them on what they should and shouldn't disseminate to the public as part of my assessment strategy.

Now understand the concept of getting "everything" sealed in a signed agreement before moving forward however, we don't consider passive reconnaissance apart of that agreement. According to Danny Bradbury (2017), Ethics plays a big part in many lines of work. Doctors can be struck down for violating codes of conduct, and lawyers can be disbarred. Journalism, too, has many ethical codes that overlap. Shouldn't those working in cybersecurity have a code of conduct too? The stakes are rising in this field, as attackers and defenders alike gain increasing power over our systems and data. For example, 40 years ago, most work was still manual and desktop computers were a hobbyist pursuit. Cybersecurity didn't matter as much.

Now, attackers can gain control of everything from our homes to our pacemakers electronically. Cybersecurity practitioners and researchers are working at the cutting edge of a highly adversarial industry, and dealing with a range of thorny problems. At the end of the day, my reputation and character mean more to me than anything with the exception of my family. So I'm not going to do anything that will jeopardize the aforementioned. With that said, I do believe there should be consequences if one deliberately decides to "cross the line" from ethical to unethical. Specifically, conducting actual pen testing on a system without written consent.

The following biblical reference lends itself very well to the topic of ethics: Matthew 5:9: Blessed are the peacemakers, for they shall be called sons of God. Regarding being a peacemaker as Jesus discussed in Matthew 5:9, Jesus used the word peacemaker in the context of solving a problem not ending a conflict such as a war. A peacemaker, in the context of solving a problem, is exactly what a security practitioner should not only be but epitomize. Proverbs 22:1 "A good name is to be chosen rather than great riches, and favor is better than silver or gold." Bottom line, as cybersecurity professionals, we should "always" operate in a glass house with a strict honor code and with an unwavering mindset that we'll "always" protect the users that we support and the profession even if we're place in those uncomfortable and unenviable positions.

Article - In Search of an Ethical Code for Cybersecurity.

Attachment:- Assignment File.rar

Verified Expert

The paper is related to the review of the penetration testing and the passive reconnaissance This paper also highlights the requirement of the new policies and procedures that works for the penetration testing and modules This paper has been prepared in Microsoft Word Document.

Reference no: EM132161074

Questions Cloud

What is the current organizational structure : What is the current organizational structure? How would you label or describe it?
Prepare and sign non-disclosure agreement documents : Talk to the client, and discuss the needs to be addressed during testing. Prepare and sign non-disclosure agreement (NDA) documents with the client
Examine the implication of change processes experienced : GSP6064 Leadership and Change Management Assignment, Gulf College Oman. Examine the implication of change processes experienced/implemented by Gosfield.
Role of the manager in managing business organizations : Assignment Task: What Managers Do? What is the role of the manager in managing business organizations
Article review - In Search of Ethical Code for Cybersecurity : Write a review on this article with 2 APA references. Article - In Search of an Ethical Code for Cybersecurity
Complete the scavenger hunt by identifying flora and fauna : Complete the scavenger hunt by identifying flora and fauna in your iSite habitat type whose survival depends on an effective strategy for the listed function
Dental Implant - find success rate to replace missing teeth : The aim of this research is to find out the success rate and the Difference in between two different treatment approaches to replace the missing teeth
Predictive analytics case study : BUS5PA Predictive Analytics Assignment - Customer Segmentation, Association Rule Mining, and MBA Case Studies. Predictive Analytics Case Study
Evaluation of the sprout social tools and how to apply it : Assignment - "Evaluation of the Sprout Social tools and how to apply it" - History of the Sprout Social tools and Definition of the Sprout Social tools

Reviews

Write a Review

 

Software Engineering Questions & Answers

  Web site distinguish between lack of capacity and a denial-o

a web site distinguish between lack of capacity and a denial-of-service attack? For example, web sites often experience a tremendous increase in volume of traffic right after an advertisement with the site's URL

  Information flow complexity

Cyclomatic complexity, monitoring devices, wireless dial-out device with controller, Request for Proposals (RFPs), Weighted IFC

  Draw a context diagram and a high level data flow diagram

Describe and critically compare different data models and schemas - Draw a Context Diagram and a high Level Data Flow Diagram to depict the given system.

  What is an lsquoenterprise system es what are some of the

what is an lsquoenterprise system es? what are some of the ways ess create value create for businesses?enterprise

  Newtonion iteration method for ode

I need a one page each a mathmatical description for: Heuns method for ODE. , Newtonion iteration method for ODE.

  Compare top three brand of virtualization software available

Compare and contrast the top three brands of virtualization software available. Focus your efforts on components such as standard configuration, hardware requirements price, and associated costs.

  Requirements to analyse-design system of sell-bike software

What are the requirements to analyse and design the system of Sell-Bike software is a SME (small to medium enterprise) company selling students bicycles.

  The uml class diagram

The resulting processing flow for CCP is shown schematically in the next figure, The UML class diagram.

  Future research and development in software engineering

Term Paper: Future Research and Development in Software Engineering, Identify trends in mobile software development and explain why they are relevant to the scenario described above

  Sketch the dependency diagram

Sketch the dependency diagram. There are suitable examples in reading assignments of dependence diagrams. In what normal form is this table? Describe why.

  Write balanced transportation problem to minimize sum

With customer 1 penalty cost of 490 is incurred; with customer 2, $80; and with customer 3, $110. Write balanced transportation problem to minimize the sum of shortage and shipping cost.

  Determine the software requirements for a company

The second case report for this course is to determine the software requirements for a company. In this assignment, you are to read the given scenario. Then, you are to analyze the scenario, write a list of questions for the company, and provide r..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd