logo

Ethical Issues in the Cyber World

Present arguments for and against transparency in decision-making assisted by algorithms developed by machine learning and discuss the potential impact on accountability and privacy.

4 Pages1178 Words341 Views
   

Added on  2023-06-11

About This Document

This essay discusses the ethical issues surrounding the cyber world, including hacking, privacy, and professional code of conduct. It explores deontology and utilitarianism theories and their application in the cyber world. The essay emphasizes the importance of following the right procedures and laws to acquire information and conduct oneself with professionalism.

Ethical Issues in the Cyber World

Present arguments for and against transparency in decision-making assisted by algorithms developed by machine learning and discuss the potential impact on accountability and privacy.

   Added on 2023-06-11

ShareRelated Documents
INTRODUCTION
In this essay am going to discuss about the ethical issues that surround the cyber world. As the
cyberworld continues to grow more and more vulnerabilities and malicious people continue to
develop. This also leads to creation and development of various tools that are used to intrude
people’s privacy. This leads to exploitation of security systems and the attackers may acquire
useful information such as credit cards and also may steal from banks and organizations. This is
done through a process known as hacking. Hacking is the process of identifying and exploiting
weaknesses in a system or network so as to gain unauthorized access. A person who is involved
in hacking activities is known as a hacker. Last year a type of virus known as ransomware that
spread across the world caused a breach in the privacy and information of a lot of people. It also
made a lot of losses to some organizations. The ransomware demanded the attacked organization
to pay ransom for its data to be released. They managed to do this by exploiting a flaw in the
windows operating system. There are different types of hackers that have established themselves
in the cyberworld. These include grey, white and black hat hackers.
Black hat hackers exploit computer systems for their own selfish needs. These are the criminal
type. They rob banks companies and even people.
White hackers are similar to ethical hackers. They can be employed to find vulnerabilities in a
system and report it them. They basically help improve the security of a particular system
Gray hat hackers neither steal for their own needs or do ethical hacking. These are the type to
hack a system without permission and instead of giving the information to that particular
organization they reveal the vulnerability for everyone to know.
Ethical hacking also known as Penetration Testing is a simulated attack which is used to assess
the type of an attack carried out by a malicious hacker. Vulnerabilities in the targeted
organization are assessed and then exploitation attempt on the vulnerabilities is done. This is to
assess the impact the exploitation would have on the target organization and also to validate the
vulnerability. An ethical hacker tries to find weaknesses in the system that could be exploited by
malicious attackers. To ensure that the security of systems is tight, companies ensure that the
vulnerabilities found during penetration testing are dealt with. This ensures that peoples data or
information is secure and cannot be accessed by unauthorized party.
Ethical Issues in the Cyber World_1
Ordinary people have also a right to privacy. Their information is of value like any other
individual in a country. This is a basic human right. There are people who have made their life
public voluntarily but still they have the right to some privacy and not be constantly followed
around on the internet and also personally. Therefore, it is unethical to access anyone’s
information without their consent. To further explain whether ordinary people have a right to
have privacy I will use the following theories.
Deontology. This theory follows rules that have been put into place. It focuses mostly on the
action done rather than the outcome of a certain situation. This theory argues that the actions or
means to a certain outcome are important. Using this theory to explain the question whether it is
ethical to access the information of an ordinary person. It is a known rule that everyone has a
basic right to privacy and therefore people are not allowed to access information of anyone.
Example, if a person is suspected of committing a cybercrime, it is important to invade their
privacy in order to acquire evidence. But, this theory argues that it is wrong to do that since the
laid-out laws state that it is wrong to invade a person’s privacy. It does not put into consideration
that invading that person’s privacy, evidence can be obtained to arrest that person.
Another theory that can be used is utilitarianism. This theory focuses on the end results to
determine whether the actions were ethical or not. This is where the phrase “the end justifies the
means” applies. Therefore, using this theory to answer our question, if that person’s privacy is
invaded and is found to have malicious intentions or content then the theory states that it is
ethical regardless of whether you had permission or not. Therefore, the finding of malicious
content is of more importance than the action of invading the privacy. In contrast if the person
does not have any malicious content, his/her privacy would have been violated for no reason.
This would be unethical but this theory does not see it that way.
The professional code of conduct goes hand in hand with the laid down laws of that particular
country. Therefore. not following the code may lead to disciplinary action taken against the
person who has not followed it. It requires everyone in the said profession to act with honesty
integrity and professionalism. Using the professional code of conduct I would use
professionalism to deal with matters that involve ethical dilemma. I would take the appropriate
actions and follow the write procedures and laws put in place to solve the problem. Example if
someone was suspected of committing a crime, the best action to do would be acquire a warranty
Ethical Issues in the Cyber World_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Hacking and Penetration Testing
|3
|417
|96

Ethical Issues in Technology and Hacking
|4
|1264
|132

Information Systems Professionals Assignment
|8
|950
|41

Ethical Hacking: WannaCry Ransomware Attack and GDPR Implications
|8
|1826
|130

Cyber Security: A Mini Report on Penetration Testing and Vulnerability Assessment
|5
|761
|432

Cyber security : Assignment PDF
|5
|1139
|160