PHIL 355E

Cybersecurity Ethics

This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.

Course Material

Throughout my enrollment in this course I have learned many things about the connections between ethics, business, and cybersecurity. The topics I found most interesting and practical to my career field were ethical tools. Prior to taking this class I had never been informed of the concept of using tools or criteria in making ethical decisions. This has allowed me to make decisions on ethical dilemmas in a more encompassing manner. I also learned about the importance of information security, something that has an effect on everyone. I have also come to understand how to properly present my position regarding an ethical dilemma.

The importance of using ethical tools when making moral decisions is paramount to having a successful cybersecurity career. It allows you to perceive your actions, the consequences they may have, and the people they may affect. Each of these are important in considering your decision, ethical tools allow you to choose decisions based on a more selfless and neutral approach. The ethical tools discussed in this course I found most practical are the deontological tool, the ethics of care tool, and the consequentialism tool. Each of these tools present a unique perspective on my decision given the unique scenario. Throughout my career I will use these ethical tools and others tools discussed within this course to guide my decisions on morally ambiguous situations.

Information security was at the forefront of many ethical dilemmas and case analysis in this class. That is why understanding the most ethical way to gather, use and protect it is of utmost importance in the realm of cybersecurity. Information in the modern cyber age is more accessible than ever before and will continue to increase in accessibility as time progresses and technology grows more advanced. The gathering of information must not abuse the expectations of privacy of individuals, groups or organizations. The use of information must not in any way result in the detriment of the proprietor of the information. Finally the protection of information must be the priority of those whose job is to protect it, as they have been placed in a position of responsibility and trust. In the future I will prioritize one’s privacy and use of information when responding to ethical issues, as it has a direct affect on the individual.

Based on the case analysis’ and the class discussions we participated in within this course, I have significantly improved my ability to present my perspectives and the information supporting them. The case analysis has allowed me to present my arguments on a topic with extensive supporting evidence as well as using previously mentioned ethical tools. Class discussions have assisted in my development of directly communicating my ethical decisions as well as continuing the conversation with other individuals on controversial ethical dilemmas. These in conjunction with one another have helped me understand how to professionally confront morally ambiguous situations. My key takeaway from this is the importance of consideration of other answers to the ethical dilemma within my confrontation of the issue.

In conclusion, this course was granted insight into the world of ethics regarding cybersecurity. I will use ethical tools to guide my decisions as they are essential to coming to a well-rounded conclusion. Information privacy and security will be prioritized in my decisions as it has a direct correlation with their life. In my response to ethical dilemmas I may face, I should address other potential responses within my own.