PHIL 355E

Cybersecurity Ethics

This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and the ways that fundamental ethical theories relate to these core issues.

Course Material

Reflective Writing

The three sources, “Collateral Murder,” an article by Dr. Adnan Abu Amer about the cyberwar between Israel and Iran, and an article by Hannah K. Lieber on the Equifax breach, cover various topics related to conflict and cybersecurity. After engaging with these sources, my perspective on these topics has evolved. 

The video “Collateral Murder” is a powerful reminder of the dangers of war and the impact of technology on modern warfare. The video shows a group of U.S. soldiers firing on unarmed civilians in Iraq, including two journalists. The video raises ethical questions about the use of force and the role of technology in war. It is shocking to see how easily a situation can escalate and lead to unnecessary loss of life. 

My position on the use of force in war has become more nuanced after watching the video. While I still believe that force may be necessary in some situations, I recognize that it should be used judiciously and with great care. The video also highlights the need for transparency and accountability in military operations. My takeaway from this video is the importance of seeking out multiple perspectives before forming an opinion about a complex issue. 

Dr. Adnan Abu Amer’s article about the cyberwar between Israel and Iran provides insight into the use of cyberattacks as a tool of political and military power. The article discusses how both Israel and Iran have used cyberattacks to target each other’s critical infrastructure and disrupt operations. It highlights the need for strong cybersecurity measures to protect against these attacks. 

My perspective on cybersecurity has deepened after reading this article. I now recognize the importance of strong cybersecurity measures not only for protecting critical infrastructure but also for safeguarding personal data. The article also emphasizes the need for international cooperation and norms around cyberattacks. My takeaway from this article is the need for continued investment in cybersecurity and the importance of taking a global perspective on this issue. 

Hannah K. Lieber’s article about the Equifax breach underscores the high stakes of cybersecurity in today’s digital world. The Equifax breach compromised the personal data of millions of individuals, and the fallout from the breach was far-reaching. The article discusses the legal, financial, and reputational consequences of the breach and highlights the need for improved cybersecurity measures. 

My position on the importance of cybersecurity has been strengthened after reading this article. I now recognize the need for proactive measures to protect personal data, including the use of strong passwords, two-factor authentication, and regular software updates. The article also emphasizes the need for transparency and accountability from companies that handle personal data. My takeaway from this article is the importance of taking responsibility for personal cybersecurity and advocating for stronger regulations to protect personal data. 

In conclusion, engaging with these sources has deepened my understanding of the complex issues surrounding conflict and cybersecurity. I have gained a deeper appreciation for the need for transparency, accountability, and collaboration in addressing these issues. My takeaway from these sources is the importance of seeking out multiple perspectives, taking a global perspective, and taking personal responsibility for cybersecurity. These are lessons that I will carry with me in my future endeavors and that I hope will guide my actions and decisions.