The Code of Honor Embracing Ethics in Cybersecurity
A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical s...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated
2024.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009828022206719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Introduction: "Like Your Hair Is On Fire"
- How Should You Read This Book?
- Why Are There Two Authors but Only One Voice?
- How Should You Approach the Critical Applications Case Studies?
- How Should You Use the Cybersecurity Code of Honor?
- A Challenge to Make the World a Better Place
- Chapter 1 One Code to Rule Them All?
- In Case You Are Wondering Why You Should Care
- Do We Need Ethics in Cybersecurity?
- Long-Standing Models for the Code
- Why the Need for the Code Is Urgent
- Chapter 2 This Is a Human Business
- Cybersecurity Is a Human Business
- Humans Have Inherent Value
- Humans Over Technology
- The Solution to the Problem of Cybersecurity Is Principally a Human Solution
- Character Costs and Character Pays
- Case Study: When Security Is on the Chopping Block
- Chapter 3 To Serve and Protect
- We Need You on That Wall
- Know Your Why-Purpose and People
- Service Means Sharing: Sharing Starts with Good Communication
- Sharing with the Broader Cyber Community: We Are All on the Same Wall
- Checking In
- A Final Example
- Case Study: Responsible Disclosure of a Security Flaw
- Chapter 4 "Zero-Day" Humanity and Accountability
- Bad Decisions and Multiplication
- Humans Are Flawed
- Turning Vulnerability into Strength: It Begins with Humility
- Being a Lifelong Learner
- Handling the Mistakes of Others
- Let's Try to Avoid "Breaking Bad"
- How to Develop a Reflective Practice
- Case Study: To Pay or Not to Pay-A Ransomware Quandary
- Chapter 5 It Begins and Ends with Trust
- The Secret of Success
- Trust Is the Currency of Cybersecurity
- How Trust Is Built
- When Things Go Bad
- Building Trust Requires Courage
- The Role of Leadership in Building a Culture of Trust
- A Checklist for Building Trust.
- Case Study: A Matter of Trust and Data Breaches
- Chapter 6 There Is Strength in the Pack
- No Room for Know-it-Alls
- Making Informed Ethical Decisions with Input
- Why Teamwork Really Does Make the Dream Work
- When Collaboration Breaks Down-Seeking Allies in Your Organization
- The Power of Mentors
- Beware of Rattlesnakes
- Case Study: Graded on a Curve? The Security Audit Checkmark
- Chapter 7 Practicing Cyber Kung Fu
- Essential to Success: Patience, Wisdom, and Self-Control
- Remember the Titanic
- A Few Principles for Emergency Planning
- Stay Calm, Cool, and Collected
- Our Job Is Not Revenge
- Develop Your Cyber Kung Fu
- Case Study: An Open Door: Vigilante Justice
- Chapter 8 No Sticky Fingers Allowed
- If It's Free, It's for Me?
- Avoid a "Robin Hood" Narrative
- A Tragedy of "Free Information"
- Intellectual Property Is Property
- To Catch a Thief, We Must Train Like One
- Choices Have Consequences
- All I Really Need to Know I Learned in Kindergarten
- Case Study: Something Borrowed and Something New
- Chapter 9 It's None of Your Business
- Curiosity Can Kill the Cat
- The Golden Rule Applied to Cybersecurity
- Stay in Your Lane
- Four Questions to Help Avoid Impropriety
- Each Time You Cross the Line, It Becomes Easier
- We Hurt Real Human Beings
- An Outrageous Example of the Problem
- Remember: We Are the Shield
- Case Study: To Share or Not to Share? Investigating the CFO's System
- Appendix A: The Cybersecurity Code of Honor
- Appendix B: Where Do We Go from Here?
- Notes
- Acknowledgments
- About the Authors
- Index
- EULA.