YKPT-22254 Ethics Term Paper
YKPT-22254 Ethics Term Paper
YKPT-22254 Ethics Term Paper
Title
Ethics in Cybersecurity
Submitted by
Student ID: YKPT-22254
Name: Aye Nyein Myint
1 September 2023
Contents
Chapters Titles Page No.
Chapter 1 Introduction 3
1.1 Ethical Cybersecurity
Chapter 2 Background Theory 4
2.1 Building a Better Cyber Space by Ethics
Chapter 3 Current concept of the Ethical Cybersecurity 5
3.1 Core Principles of Ehtical Cybersecurity
3.2 Data Protection Laws
Chapter 4 Ongoing Processes of Ethical Cybersecurity 8
4.1 Integrating Ethics into Cybersecurity
4.2 Establishing Ethics in Cybersecurity
4.3 Benefits of Ethical Cybersecurity
Chapter 5 Conclusion 11
Reference 11
3
Chapter 2
Background Theory
2.1 Building a Better Cyber Space by Ethics
Today, cyber crimes and threats are happening all over the world. Not only to
organizations and companies, cyber issues become involve in individual’s life. Privacy
protection is really important for every person. Today is a digital age and almost everything
in our daily life has become connected to internet and electronic devices. There become cyber
crimes such as individual cyber crimes, organisation cyber crimes, property cybercrimes,
society cybercrimes and so on. There are so many ways to commit a cyber crime. Most
common cyber crimes are phishing and scam, identity theft, ransomware attack, hacking
computer networks and Internet fraud. There are still other types of cybercrime such as cyber
bullying, cyber stalking, software piracy, social media frauds, online drug trafficking,
electronic money laundering and cyber extortion.
This is why cyber security is important and need to align with ethical principles. Cyber
security is the act of saveguarding users’ data and protecting from cyber threats. Those cyber
crimes are done by unethical hackers who only look for their profits neglecting the others’
property. In this research, we are about to learn what are ethical principles and standards,
which laws are protecting, to to integrate ethics into cybersecurity and step by step
procedures. By knowing the values of ethics in cyber sapce and adhering to etical principles,
we will be able to build a better and more secure society in our digital life.
Chapter 3
4
Current Concept of the Ethical Cybersecurity
3.1 Core Principles of Ethical Cbyersecurity
Ethical cybersecurity is a field that focuses on the responsible and moral use of
information technology and security practices. It aims to protect data, systems, and networks
while upholding principles of fairness, transparency, and respect for individual privacy and
rights. Here are some core principles of ethical cybersecurity:
CIA
The CIA in cybersecurity is a vision that concentrates on the balance between the
confidentiality, integrity, and availability of data under the protection of your information
security structure.
Privacy
Respect individuals' privacy and protect their personal information. Only collect and
use data that is necessary for legitimate security purposes, and ensure it is stored and
processed securely.
Transparency
Be open and transparent about cybersecurity practices, policies, and procedures. Users
should have a clear understanding of how their data is collected, used, and protected.
Accountability
Establish clear lines of responsibility for cybersecurity within an organization. Hold
individuals and entities accountable for security breaches and unethical behavior.
Risk Management
Identify, assess, and prioritize potential risks to systems and data. Ethical cybersecurity
practitioners work to minimize risks by implementing appropriate security controls and
response plans.
Data breaches leave end users vulnerable to crime such as identity theft and victims of
unsolicited contact from malicious organizations and there is a real cost for businesses. When
an organization is determined to be guilty of inadequate data protection practices — whether
or not a breach actually happens — the organization is liable to punishment in the form of
hefty fines.
5
1. General Data Protection Regulation (GDPR)
Canada's federal privacy law, PIPEDA, regulates the collection, use, and
disclosure of personal information by private sector organizations. It includes
principles such as consent, accountability, and the right to access personal data.
The UK's Data Protection Act 2018, aligned with GDPR, governs data
protection in the United Kingdom post-Brexit. It covers the processing of personal
data and grants individuals rights over their data.
Singapore's PDPA establishes rules for the collection, use, and disclosure of
personal data by organizations. It includes provisions for consent, data protection
officers, and breach notification.
Under the Australian Privacy Act 1988, the APPs govern the handling of
personal information by Australian government agencies and many private sector
organizations.
6
8. Personal Information Protection Law (PIPL)
China's PIPL is a comprehensive data protection law that came into effect in
2021. It imposes restrictions on cross-border data transfers and includes provisions for
consent and data subject rights.
India introduced the Personal Data Protection Bill, 2019 (PDP Bill) to regulate
the processing of personal data. As of my last knowledge update in September 2021,
the PDP Bill was under consideration.
These are the laws around the world protecting for data privacy. Taking specific
actions on unethical behaviours in cyber sapce will reduce the amount of cyber crimes and
people will aware of the risks while making actions on others’ pivacy. By knowing laws and
regulations, orginizations and companies will be able to set codes of ethics that align with the
laws. Those are the laws must be awared by individuals whoever work in IT field.
7
Chapter 4
Ongoing Processes of Ethical Cyber Security
4.1 Integrating Ethics into Cyber Security
Integrating ethics into cybersecurity is crucial in today's digital age, where technology
is deeply embedded in our lives and cyber threats are constantly evolving. Ethical
considerations should guide the actions of individuals, organizations, and governments in the
realm of cybersecurity. Here are some considerations while making ethical cybersecurity
practices.
Informed Consent:
Users should have a clear understanding of the risks associated with using digital
services, and they should provide informed consent for data collection and processing.
Organizations should communicate the potential security risks and empower users to make
informed decisions.
Vulnerability Disclosure:
Ethical hackers (often referred to as "white hat" hackers) play a critical role in
identifying and reporting vulnerabilities. Organizations should encourage responsible
disclosure and treat security researchers with respect, acknowledging their contributions.
International Collaboration:
Educational Initiatives:
Whistleblower Protection:
Individuals who witness unethical or illegal cybersecurity practices should have the
means to report these concerns without fear of retaliation. Whistleblower protection policies
can help create an environment of accountability.
By prioritizing ethical considerations, the cybersecurity community can work towards a
safer and more responsible digital environment for all.
8
4.2 Establishing Ethics in Cyber Security
This is essential for ensuring the responsible and moral use of technology to protect
digital systems and data. Here are some steps to help organizations and individuals establish
ethics in cybersecurity:
Leadership Commitment:
Ensure that top leadership and management are committed to upholding ethical
standards in cybersecurity. Their support and endorsement of ethical practices will set the
tone for the entire organization.
Develop a framework that helps employees make ethical decisions when faced with
complex situations.
Encourage the consideration of potential consequences, stakeholders' interests, and
alignment with ethical principles when making cybersecurity choices.
Integrate ethical considerations into the entire cybersecurity lifecycle, from design
and development to implementation and maintenance.
Implement a review process that assesses the ethical implications of new
technologies, tools, and practices before they are adopted.
Work closely with legal and compliance teams to ensure that cybersecurity practices
adhere to relevant laws, regulations, and industry standards.
Align ethical practices with legal requirements, such as data protection regulations.
9
4.3 Benefits of Ehtical Cyber Security
The final section summarizes the connections between the information discussed in the
body of the paragraph and the paragraph’s controlling idea.
Ethical cybersecurity practices often align with legal and regulatory requirements. By
adhering to ethical principles, you can reduce the risk of legal penalties, fines, and
reputational damage resulting from non-compliance.
Users are more likely to trust and remain loyal to organizations that prioritize ethical
cybersecurity. When customers feel that their data and privacy are well-protected, they are
more likely to continue using your services.
Reduced Costs:
In summary, ethical cybersecurity is not only about compliance and risk mitigation, but
it also fosters a culture of trust, responsibility, and accountability. The benefits extend beyond
the organization's immediate operations, positively impacting users, stakeholders, and the
broader digital ecosystem.
10
Chapter 5
Conclusion
The complex and dynamic nature of cybersecurity demands a continuous evaluation of
the ethical dimensions that underpin the field. As technology continues to evolve, ethical
considerations must evolve in tandem, with a focus on safeguarding data, respecting privacy,
and promoting digital trust. This paper describes what are happening in cyber space and the
importance of cybersecurity. The principles of Ethical Cybersecurity, Laws and Regulations,
how to integrate ethics into cybersecurity, step by step of establishing Ethical Cybersecurity
and the benefits are enough mentioned. And also, this paper underscores the critical
importance of ethical decision-making in cyber security and emphasizes the need for a
holistic approach that encompasses individual actions, organizational policies, and global
cooperation. With these knowledges, we will be able to aware of the cyber crimes and attacks
and be able to protect our importance privacy data from cyber criminals. Moreover, adhering
to Ethical Cybersecurity principles in our practices will let us to live in a better and more
secure society.
References
1. https://www.scu.edu
2. https://www.counseling.org
3. https://www.checkpoint.com
4. https://www.horangi.com
5. https://www.google.com
11