The Code of Honor Embracing Ethics in Cybersecurity

A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical s...

Descripción completa

Detalles Bibliográficos
Autor principal: Maurer, Paul J. (-)
Otros Autores: Skoudis, Ed
Formato: Libro electrónico
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated 2024.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009828022206719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Introduction: "Like Your Hair Is On Fire"
  • How Should You Read This Book?
  • Why Are There Two Authors but Only One Voice?
  • How Should You Approach the Critical Applications Case Studies?
  • How Should You Use the Cybersecurity Code of Honor?
  • A Challenge to Make the World a Better Place
  • Chapter 1 One Code to Rule Them All?
  • In Case You Are Wondering Why You Should Care
  • Do We Need Ethics in Cybersecurity?
  • Long-Standing Models for the Code
  • Why the Need for the Code Is Urgent
  • Chapter 2 This Is a Human Business
  • Cybersecurity Is a Human Business
  • Humans Have Inherent Value
  • Humans Over Technology
  • The Solution to the Problem of Cybersecurity Is Principally a Human Solution
  • Character Costs and Character Pays
  • Case Study: When Security Is on the Chopping Block
  • Chapter 3 To Serve and Protect
  • We Need You on That Wall
  • Know Your Why-Purpose and People
  • Service Means Sharing: Sharing Starts with Good Communication
  • Sharing with the Broader Cyber Community: We Are All on the Same Wall
  • Checking In
  • A Final Example
  • Case Study: Responsible Disclosure of a Security Flaw
  • Chapter 4 "Zero-Day" Humanity and Accountability
  • Bad Decisions and Multiplication
  • Humans Are Flawed
  • Turning Vulnerability into Strength: It Begins with Humility
  • Being a Lifelong Learner
  • Handling the Mistakes of Others
  • Let's Try to Avoid "Breaking Bad"
  • How to Develop a Reflective Practice
  • Case Study: To Pay or Not to Pay-A Ransomware Quandary
  • Chapter 5 It Begins and Ends with Trust
  • The Secret of Success
  • Trust Is the Currency of Cybersecurity
  • How Trust Is Built
  • When Things Go Bad
  • Building Trust Requires Courage
  • The Role of Leadership in Building a Culture of Trust
  • A Checklist for Building Trust.
  • Case Study: A Matter of Trust and Data Breaches
  • Chapter 6 There Is Strength in the Pack
  • No Room for Know-it-Alls
  • Making Informed Ethical Decisions with Input
  • Why Teamwork Really Does Make the Dream Work
  • When Collaboration Breaks Down-Seeking Allies in Your Organization
  • The Power of Mentors
  • Beware of Rattlesnakes
  • Case Study: Graded on a Curve? The Security Audit Checkmark
  • Chapter 7 Practicing Cyber Kung Fu
  • Essential to Success: Patience, Wisdom, and Self-Control
  • Remember the Titanic
  • A Few Principles for Emergency Planning
  • Stay Calm, Cool, and Collected
  • Our Job Is Not Revenge
  • Develop Your Cyber Kung Fu
  • Case Study: An Open Door: Vigilante Justice
  • Chapter 8 No Sticky Fingers Allowed
  • If It's Free, It's for Me?
  • Avoid a "Robin Hood" Narrative
  • A Tragedy of "Free Information"
  • Intellectual Property Is Property
  • To Catch a Thief, We Must Train Like One
  • Choices Have Consequences
  • All I Really Need to Know I Learned in Kindergarten
  • Case Study: Something Borrowed and Something New
  • Chapter 9 It's None of Your Business
  • Curiosity Can Kill the Cat
  • The Golden Rule Applied to Cybersecurity
  • Stay in Your Lane
  • Four Questions to Help Avoid Impropriety
  • Each Time You Cross the Line, It Becomes Easier
  • We Hurt Real Human Beings
  • An Outrageous Example of the Problem
  • Remember: We Are the Shield
  • Case Study: To Share or Not to Share? Investigating the CFO's System
  • Appendix A: The Cybersecurity Code of Honor
  • Appendix B: Where Do We Go from Here?
  • Notes
  • Acknowledgments
  • About the Authors
  • Index
  • EULA.