Ethical Considerations in Cybersecurity: A Project Report
VerifiedAdded on 2025/05/09
|10
|1958
|66
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Table of Contents
Project Summary........................................................................................................................2
Objectives...............................................................................................................................2
Methods..................................................................................................................................2
Expected Outcome.................................................................................................................2
Data to be collected................................................................................................................2
How data will be processed....................................................................................................2
Ethics Principles.........................................................................................................................3
Information to Participants Form...............................................................................................4
Consent Form.............................................................................................................................5
Protect the anonymity and confidentiality.................................................................................6
Include deception of participants?.............................................................................................7
Provide the right to withdraw.....................................................................................................7
Project Summary........................................................................................................................2
Objectives...............................................................................................................................2
Methods..................................................................................................................................2
Expected Outcome.................................................................................................................2
Data to be collected................................................................................................................2
How data will be processed....................................................................................................2
Ethics Principles.........................................................................................................................3
Information to Participants Form...............................................................................................4
Consent Form.............................................................................................................................5
Protect the anonymity and confidentiality.................................................................................6
Include deception of participants?.............................................................................................7
Provide the right to withdraw.....................................................................................................7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Project Summary
Objectives
The main objective behind the ethics in the field of cyber security is that it mainly helps in
saving the data as well as the attacks that are enforced on various systems from different
resources. Ethics sets the protocols and that helps in stopping the cybercrimes and various
causes related to the network. Ethics are mainly defined as the moral principles that help in
governing the behavior of a person. This is considered as the critical part of any of the
cybersecurity defense strategy. The objective is setting the standards as well as the rules in
order to keep the security of the cyber network so that the system, as well as the data, could
be protected properly.
Methods
Ethics in the field of technology is considered as one of the most important parts. There are
various methods that are being used in order to keep ethics in cybersecurity. Numbers of a
different standard are being set and many of the rules are also set in order to keep the data as
well as system secure from the hackers or the attackers. Methods here in the field of ethics in
cyber security are mainly the rules and the standards.
Expected Outcome
After the methods such as the rules and the standard are being set in the field of ethics in the
cybersecurity, the outcome that is being expected is that the ratio of the cyber-crimes tends to
get decreased. The cyber cases are mainly monitored and resolved with the help of the
various offices that are being set to solve the issues related to the security of the network,
system and the data.
Data to be collected
When the methods or the rules are being set proper collection of the data is to be done. Using
the NICE framework, three different roles of the jobs are being defined by the NIST. The
different jobs are the exploitation analyst, the cyber operator as well as the target network
Objectives
The main objective behind the ethics in the field of cyber security is that it mainly helps in
saving the data as well as the attacks that are enforced on various systems from different
resources. Ethics sets the protocols and that helps in stopping the cybercrimes and various
causes related to the network. Ethics are mainly defined as the moral principles that help in
governing the behavior of a person. This is considered as the critical part of any of the
cybersecurity defense strategy. The objective is setting the standards as well as the rules in
order to keep the security of the cyber network so that the system, as well as the data, could
be protected properly.
Methods
Ethics in the field of technology is considered as one of the most important parts. There are
various methods that are being used in order to keep ethics in cybersecurity. Numbers of a
different standard are being set and many of the rules are also set in order to keep the data as
well as system secure from the hackers or the attackers. Methods here in the field of ethics in
cyber security are mainly the rules and the standards.
Expected Outcome
After the methods such as the rules and the standard are being set in the field of ethics in the
cybersecurity, the outcome that is being expected is that the ratio of the cyber-crimes tends to
get decreased. The cyber cases are mainly monitored and resolved with the help of the
various offices that are being set to solve the issues related to the security of the network,
system and the data.
Data to be collected
When the methods or the rules are being set proper collection of the data is to be done. Using
the NICE framework, three different roles of the jobs are being defined by the NIST. The
different jobs are the exploitation analyst, the cyber operator as well as the target network

analyst. Each of these jobs performs the various duties, uses different tools along with the
techniques and the procedures in the stage of collecting the data.
How data will be processed
The first job is of the exploitation analyst. The person is the cybersecurity practitioner
who mainly focusses on the identification of the weaknesses as well as the potentially
exploitable vulnerabilities within a targeted network. The collection of data here is mainly
being focussed on the data that is considered as the most useful, doing the analyzation of
the data through the eyes.
The next one is the target network analyst job that helps in taking the technology’s
advantages in order to gather the data and also tracks the target of a human. The data used
by this analyst are the open-source data. The work of this type is to collect the data using
the open-source and performs further operations.
The next type of job is the job of the cyber-operator that is a bit similar to the job of an
exploitation analyst. It mainly focusses on the breadth, not on depth. The main job of the
cyber operator is collecting the data from different sources in order to find, exploiting the
potential targets as well as the tracking system. The main or the most important role is the
collection of the data and the processing; however, the actions of the exploitation could
also be performed.
Ethics Principles
The principles of ethics are discussed below as:
Truthfulness and confidentiality
The first principle is Truthfulness as well as confidentiality. If the data that is kept on the
networks is not in the safe hands then the trust and faith could not be built with the system
by the customers. This is considered as one of the most important parts. Moving on the
other factor is the confidentiality; this is also one of the most important factors to be
considered as the data that is kept on the large networks are to be kept safe and protected
and such data should not be shared and must be kept confidential.
techniques and the procedures in the stage of collecting the data.
How data will be processed
The first job is of the exploitation analyst. The person is the cybersecurity practitioner
who mainly focusses on the identification of the weaknesses as well as the potentially
exploitable vulnerabilities within a targeted network. The collection of data here is mainly
being focussed on the data that is considered as the most useful, doing the analyzation of
the data through the eyes.
The next one is the target network analyst job that helps in taking the technology’s
advantages in order to gather the data and also tracks the target of a human. The data used
by this analyst are the open-source data. The work of this type is to collect the data using
the open-source and performs further operations.
The next type of job is the job of the cyber-operator that is a bit similar to the job of an
exploitation analyst. It mainly focusses on the breadth, not on depth. The main job of the
cyber operator is collecting the data from different sources in order to find, exploiting the
potential targets as well as the tracking system. The main or the most important role is the
collection of the data and the processing; however, the actions of the exploitation could
also be performed.
Ethics Principles
The principles of ethics are discussed below as:
Truthfulness and confidentiality
The first principle is Truthfulness as well as confidentiality. If the data that is kept on the
networks is not in the safe hands then the trust and faith could not be built with the system
by the customers. This is considered as one of the most important parts. Moving on the
other factor is the confidentiality; this is also one of the most important factors to be
considered as the data that is kept on the large networks are to be kept safe and protected
and such data should not be shared and must be kept confidential.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Minimizing the Risk and Harm
The next principle of ethics in the field of cybersecurity is the Risk minimization factor
and reducing the harm. Using ethics in the cyber security field or in any of the other field,
the risk factor reduces or something becomes negligible. This is one of the most
important factors in managing and mitigating the risk. The possible risks could be the
leaking of the data or the data could be misused by the hackers or the attackers.
Informed consent
The term informed consent defines that every person who undergoes any of the
procedure related to the healthcare context should provide the approval of the
procedure that has to be done. For the complete information related to the
cybersecurity, the entire information must be provided to the users. The customers
must be completely informed related to the entire content.
Autonomy
The next principle to be considered is Autonomy. This is one of the most important
ethical principles that everyone is very much aware of but they are not much familiar by
their name. Autonomy basically refers to the right of self-determination of each
individual along with the independence and the freedom in order to choose own choices.
In respect to the cybersecurity, autonomy is really important and helps the user to take the
decision on its own and according to their own situation.
Information to Participants Form
Project Explanation
The next principle of ethics in the field of cybersecurity is the Risk minimization factor
and reducing the harm. Using ethics in the cyber security field or in any of the other field,
the risk factor reduces or something becomes negligible. This is one of the most
important factors in managing and mitigating the risk. The possible risks could be the
leaking of the data or the data could be misused by the hackers or the attackers.
Informed consent
The term informed consent defines that every person who undergoes any of the
procedure related to the healthcare context should provide the approval of the
procedure that has to be done. For the complete information related to the
cybersecurity, the entire information must be provided to the users. The customers
must be completely informed related to the entire content.
Autonomy
The next principle to be considered is Autonomy. This is one of the most important
ethical principles that everyone is very much aware of but they are not much familiar by
their name. Autonomy basically refers to the right of self-determination of each
individual along with the independence and the freedom in order to choose own choices.
In respect to the cybersecurity, autonomy is really important and helps the user to take the
decision on its own and according to their own situation.
Information to Participants Form
Project Explanation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The entire project is based on the topic named Cyber Security. The topic consists the
complete information related to the cybersecurity, the harms that could be encountered if the
system, data or the network is not kept safe and what could be methods or the principles that
must be used to reduce the risks as well as the harms onto the security. Not just these but also
the data if not kept safe or confidential then it would lose the faith in the people.
What will be the Participant asked to do?
While performing this task the contestant or the participant would be asked to attend the
asked questions. The questions appeared will be provided with the multiple options and also
the open source questions would also be answered properly. The questions would be related
to the main topic of the assignment that is Cyber Security.
What will the participant gain from participating?
The main things that could be covered in participation are asking the different questions to
the participants and the learnings that are gained by the user is the deep knowledge related to
the topic and the things get more clear.
How will the information I give be used?
The other part is the use of information that is being provided. The surveys that are held
collect the large number of feedbacks and because of those feedbacks, the information could
be used for the publishing of the academic articles. The data would be collected from
anonymous people and places and that would not be shown by the names or any kind of
identification.
What are the potential risks of participating in this project?
In participating here, there are negligible numbers of risks as this helps in providing a lot of
benefits to the students as well as the volunteers participating in this event.
How will this project be conducted?
The project would be conducted in a number of ways as there would be a survey where
different people will give their ideas or the knowledge related to the project and later on using
those feedbacks, the academic articles are being publishing, also the link would be created
that is being given to the various students who fill the forms and give their views even
without entering names and providing any type of identification. The questions appeared will
complete information related to the cybersecurity, the harms that could be encountered if the
system, data or the network is not kept safe and what could be methods or the principles that
must be used to reduce the risks as well as the harms onto the security. Not just these but also
the data if not kept safe or confidential then it would lose the faith in the people.
What will be the Participant asked to do?
While performing this task the contestant or the participant would be asked to attend the
asked questions. The questions appeared will be provided with the multiple options and also
the open source questions would also be answered properly. The questions would be related
to the main topic of the assignment that is Cyber Security.
What will the participant gain from participating?
The main things that could be covered in participation are asking the different questions to
the participants and the learnings that are gained by the user is the deep knowledge related to
the topic and the things get more clear.
How will the information I give be used?
The other part is the use of information that is being provided. The surveys that are held
collect the large number of feedbacks and because of those feedbacks, the information could
be used for the publishing of the academic articles. The data would be collected from
anonymous people and places and that would not be shown by the names or any kind of
identification.
What are the potential risks of participating in this project?
In participating here, there are negligible numbers of risks as this helps in providing a lot of
benefits to the students as well as the volunteers participating in this event.
How will this project be conducted?
The project would be conducted in a number of ways as there would be a survey where
different people will give their ideas or the knowledge related to the project and later on using
those feedbacks, the academic articles are being publishing, also the link would be created
that is being given to the various students who fill the forms and give their views even
without entering names and providing any type of identification. The questions appeared will

be provided with the multiple options and also the open source questions would also be
answered properly. The questions would be related to the main topic of the assignment that is
Cyber Security
Who is conducting the study?
The person who would be conducting the entire study is Chief Investigator: “Dr. Amir
Ghapanchi” from the College of Engineering and Science at Victoria University. His contact
number is “9919 4668”. And email id is “Email: amir.ghapanchi@vu.edu.au”
For any other kind of queries, the above-mentioned person is to be contacted and all the
queries related to the study would be solved here.
Consent Form
Age Information
For participating in the study or the event the student or the person must be above the age of
18 or at least 18. For participating in the study the participant must provide the proof of their
age.
Risk being fully explained
All the risks must be properly is explained to the volunteers so that the volunteer must be
aware of how to cope up with the risks and how to sort out the things that are being
encountered during the performance of the study.
Given the opportunity to withdraw at any phase
The participant and the volunteer are allowed to withdraw from the study at any of the point
of participation due to any reason he/she is facing and have all the rights to do so. No actions
related to the withdrawal would be taken or jeopardize.
Given the opportunity to ask any question
Each of the participant or the student is related to the study have full rights to ask the
questions and can ask any of the queries related to the study and that would definitely be
answered.
answered properly. The questions would be related to the main topic of the assignment that is
Cyber Security
Who is conducting the study?
The person who would be conducting the entire study is Chief Investigator: “Dr. Amir
Ghapanchi” from the College of Engineering and Science at Victoria University. His contact
number is “9919 4668”. And email id is “Email: amir.ghapanchi@vu.edu.au”
For any other kind of queries, the above-mentioned person is to be contacted and all the
queries related to the study would be solved here.
Consent Form
Age Information
For participating in the study or the event the student or the person must be above the age of
18 or at least 18. For participating in the study the participant must provide the proof of their
age.
Risk being fully explained
All the risks must be properly is explained to the volunteers so that the volunteer must be
aware of how to cope up with the risks and how to sort out the things that are being
encountered during the performance of the study.
Given the opportunity to withdraw at any phase
The participant and the volunteer are allowed to withdraw from the study at any of the point
of participation due to any reason he/she is facing and have all the rights to do so. No actions
related to the withdrawal would be taken or jeopardize.
Given the opportunity to ask any question
Each of the participant or the student is related to the study have full rights to ask the
questions and can ask any of the queries related to the study and that would definitely be
answered.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Information will be kept confidentially
All the information related to the study would be kept confidential and no leakage of the
information is seen in the study and assurance of not spreading the information is given. Each
of the information would be kept confidential.
All the information related to the study would be kept confidential and no leakage of the
information is seen in the study and assurance of not spreading the information is given. Each
of the information would be kept confidential.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Protect the anonymity and confidentiality
How will data be de-identified?
The entire data to be collected from various sources is kept de-identified by the links
provided to the people or the participants does not provide the name field to be compulsorily
filled. The feedback taken in the surveys is taken without the name of the person being
mentioned.
How will data be kept?
Data will be kept safe and the collected data from the different sources will be used in
different ways like the data collected from the feedback is used as the academic articles and
gets published.
Who will access the data?
The data being collected is easily accessible but also the data is kept confidential and the
person providing the feedback is de-identified.
How will results be published?
The data that is being collected from various sources are published in the form of academic
articles.
How will data be de-identified?
The entire data to be collected from various sources is kept de-identified by the links
provided to the people or the participants does not provide the name field to be compulsorily
filled. The feedback taken in the surveys is taken without the name of the person being
mentioned.
How will data be kept?
Data will be kept safe and the collected data from the different sources will be used in
different ways like the data collected from the feedback is used as the academic articles and
gets published.
Who will access the data?
The data being collected is easily accessible but also the data is kept confidential and the
person providing the feedback is de-identified.
How will results be published?
The data that is being collected from various sources are published in the form of academic
articles.

Include the deception of participants?
In case of any of the deception of the participants are seen then the risk gets increased and
due to which the event or the study could get harmed. At this very moment of time, the
participant is thrown out of the event and the issue is being resolved easily by providing the
power to the participants at any of the phase.
Provide the right to withdraw
Each of the participants must be provided the right to withdraw at any of the moment of time
that would not enforce any of the volunteer or the participant to stay connected to the study or
the event, they are free to withdraw their names at any moment or the phase.
In case of any of the deception of the participants are seen then the risk gets increased and
due to which the event or the study could get harmed. At this very moment of time, the
participant is thrown out of the event and the issue is being resolved easily by providing the
power to the participants at any of the phase.
Provide the right to withdraw
Each of the participants must be provided the right to withdraw at any of the moment of time
that would not enforce any of the volunteer or the participant to stay connected to the study or
the event, they are free to withdraw their names at any moment or the phase.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



