The Crucial Role of Ethics in Cybersecurity

Rebecca Ihenyen
4 min readNov 28, 2023

--

Photo by Christina @ wocintechchat.com on Unsplash

Hi there! This week I’ll be delving into ethics and it’s importance in cybersecurity.

As our reliance on digital systems and networks continues to grow, so does the need for robust measures to protect sensitive information from malicious actors. However, as the cybersecurity landscape evolves, it becomes increasingly evident that ethical considerations are just as critical as technical prowess.

A few people who read my articles asked why I always close with “Until next time, find me where the good guys are!” I explained to them that the only thing that separates cybersecurity professionals into the good or bad category is ethics. We all do the same thing but for good or bad purposes. My reason for ending with that phrase is to remind my readers that I am one of the good guys, doing the right thing ethically.

An example is the Ethical Hacker role, these people hack with approval from the organization with the intent of improving their security posture. While a Malicious Hacker is someone that is actively working without approval from an organization to disable security systems with the intent of either taking down a system or stealing information. Ethical hacking, or penetration testing, is a powerful tool in our arsenal. However, its deployment demands an ethical mindset. We tread the fine line between identifying vulnerabilities and respecting privacy, always ensuring that our actions are well within legal and ethical boundaries.

Whilst on the topic of Hackers, in recent times I’ve seen about two different posts on the X app where members of a team were calling out a company and their team lead for not paying the bounty promised even after successfully reporting their findings. This did not look good for the company because it showed they’re not ethically sound and can’t be trusted even by customers.

Bug bounty programs offer monetary rewards to ethical hackers for successfully discovering and reporting a vulnerability or bug to the application’s developer. While bug bounty programs are a common practice, ethical concerns arise when determining the appropriate compensation for individuals who discover and report these vulnerabilities (as seen above). Ensuring fair and just rewards is crucial for maintaining the integrity of such programs and encourages those who chose to go the ethical hacker route to stay there.

Responsible Vulnerability Disclosure: One of the ethical pillars involves the responsible disclosure of vulnerabilities. Identifying and exploiting weaknesses in systems is an inherent part of cybersecurity, but how we handle this information is critical. The principle of responsible disclosure ensures that, when vulnerabilities are discovered, we follow a systematic and ethical process, notifying relevant parties promptly. This collaborative approach mitigates risks and fosters a culture of trust within the cybersecurity team.

Data Privacy and Protection: As custodians of sensitive information, maintaining the highest standards of data privacy is a paramount ethical responsibility. The implementation of robust security measures is not just about preventing potential threats but also about respecting the privacy rights of individuals. Striking this delicate balance is a constant challenge, but it’s one that defines the ethical fabric of our cybersecurity efforts.

Adherence to Ethical Frameworks: In the complex web of global cybersecurity, collaboration is key. Whether it’s sharing threat intelligence or working with international partners, adherence to ethical frameworks ensures that we protect not only our interests but also uphold a collective responsibility to secure the digital space globally. Ethical considerations guide the sharing of information, ensuring a delicate equilibrium between collective security and individual privacy.

Continuous Education and Adapting to Ethical Challenges: The pace of technological advancement requires constant learning and adaptation. Staying ahead of cyber threats means not only enhancing technical skills but also staying accustomed to the ethical implications of emerging technologies. Ethical cybersecurity professionals are committed to ongoing education, ensuring that their practices align with evolving ethical standards and societal expectations.

Protection of Intellectual Property: Ethical behavior extends to the protection of intellectual property. Cybersecurity professionals must refrain from engaging in or supporting activities that involve the theft of trade secrets, proprietary information, or unauthorized access to copyrighted material. Regarding this, I’ve come across several accounts on the X app that share paid courses/materials for free to hundreds of people. As much as I understand we’re all trying to look out for the next person and helping our community, it’s still the wrong thing to do as someone else who should be earning for the work they put in is not even aware his/her study material has gone so far. Please let’s do better as individuals and as a community of ethical professionals.

The ethical considerations that highlight the work in cybersecurity are not just a set of guidelines; they are the moral compass that guides every step and decision. As a guardian of digital spaces, I recognize that the choices I make have far-reaching consequences. Embracing ethics in cybersecurity is not just a professional obligation but a commitment to building a digital landscape that is not only secure but also just, transparent, and respectful of the rights and privacy of every individual.

Until next time, find me where the good guys are!

--

--

Rebecca Ihenyen
Rebecca Ihenyen

Written by Rebecca Ihenyen

Figuring out cybersecurity & GRC one step at a time—so you don’t have to! Sharing my wins, fails and lessons from my tech pivot. Follow for vibes & insights!

No responses yet