Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please explain briely in your own words. Markkula Center for Applied Ethics at Sana Giarz University. begin{tabular}{l|l|l|} ABOUT THECENTER & FOCUSAREAS & ETHICSRES end{tabular} Ethical

please explain briely in your own words.
image text in transcribed
image text in transcribed
image text in transcribed
Markkula Center for Applied Ethics at Sana Giarz University. \begin{tabular}{l|l|l|} ABOUT THECENTER & FOCUSAREAS & ETHICSRES \end{tabular} Ethical Dilemmas in Cybe Home + Markkula Center for Applied Ethics Focus Areas. Intern A Learning Lab at RSA Irina Raicu Irina Raicu is the director of the intemet Ethics program at the Markkula Center for hpplied Ethics at Santa Clara University. Views are her own. On April 17, I was one of three facilitators of a Leaming Lab as part of the RSA conference in San Francisco-joining Sean Brooks of the Center for Long-tem Cybersecurity at U, C. Berkley and Jeff Klaben of SR! Intemational. The Learning Lab discussed a number of ethical dilemmas in cybersecurity and introduced ways to address those dilemmas. In anticipation of that discussion, we asked potential participants to rank the ones listed below, and invited them to add other dilemmas to the list. Vulnerability disclosure: When and how should researchers inform the public about vuinerabilities in widely-used products? What steps should be taken before any such notification? Encryption: What should companies do in response to legal Iaw enforcement requests for encrypted data? Should known vulnerabilities in systems be used to comply with requests that would otherwise be impossible? Should law enforcement agencies use such vulnerabilities themselves if they suspect a formal legal request will not bear fruit? Research: How should researchers balance the use of potentially aggressive penetration testing techniques against the legal rights of the owners of systems they are researching? Does that balance change in cases where those system owners are not implemanting reasonably strong security methods? Automated security tools: Is it ethical to release tcols that can automate attacks on a broad array of systems into the wild? Sale restrictions: What (if any) is the responsibility of cybersecurity professionals to try to prevent the sale of products they have developed to autocratic governments that would use them to harm their citizens? The role of the CISO: What kinds of personal risk should a Chief Information Security Officer or manager-level security officer accept on behalf of an organization? It is not uncommon for cisOs to be fired or forced out when a cybersecurity breach occurs; should organizations offer cisOs employment agreements that include provisions for relief from personal legal liability or other protections? How should organizational deficiencies (under-investment, bad practices, etcif factor in this analysis? Cybersecurity incident response: How much time and energy should be spent investigating a breach? What is an appropriate level of incident detail to share with customers and other stakeholders? How thick is the line between satisfying organizational obl gations and finding the complete truth behind an incident? ave you considered the ethical dimenions of these issues? What other cybersecurity-related ethical estions would you add to that list? lated materials: What would you add to the list of ethical dilemmas in cybersecurity? At least suggest two things and exp ain briefly. What would you remove from the list of ethical dilemmas in cybersecurity? At least suggest two things to remove and explain briefly

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Students also viewed these Databases questions