Books+ Search Results

The code of honor : embracing ethics in cybersecurity

Title
The code of honor : embracing ethics in cybersecurity / Paul J. Maurer, Ed Skoudis.
ISBN
1394275870
9781394275878
1394275862
9781394275861
Publication
Hoboken, New Jersey : John Wiley & Sons, Inc., [2024]
Physical Description
1 online resource (221 p.)
Local Notes
Access is available to the Yale community.
Notes
Description based on online resource; title from digital title page (viewed on June 07, 2024).
Access and use
Access restricted by licensing agreement.
Summary
A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - including medicine, law, and engineering - have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, President of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, President of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies - called Critical Applications - at the end of each chapter that help the reader determine how to apply the hands-on skills described in the book. You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. Carefully crafted frameworks for ethical decision-making in cybersecurity. Timeless principles based on those adopted in countless professions, creeds, and civilizations. Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day.
Variant and related titles
O'Reilly Safari. OCLC KB.
Other formats
Print version: Maurer, Paul J. The Code of Honor Newark : John Wiley & Sons, Incorporated,c2024
Format
Books / Online
Language
English
Added to Catalog
July 02, 2024
Bibliography
Includes bibliographical references and index.
Contents
Cover
Title Page
Copyright Page
Contents
Introduction: "Like Your Hair Is On Fire"
How Should You Read This Book?
Why Are There Two Authors but Only One Voice?
How Should You Approach the Critical Applications Case Studies?
How Should You Use the Cybersecurity Code of Honor?
A Challenge to Make the World a Better Place
Chapter 1 One Code to Rule Them All?
In Case You Are Wondering Why You Should Care
Do We Need Ethics in Cybersecurity?
Long-Standing Models for the Code
Why the Need for the Code Is Urgent
Chapter 2 This Is a Human Business
Cybersecurity Is a Human Business
Humans Have Inherent Value
Humans Over Technology
The Solution to the Problem of Cybersecurity Is Principally a Human Solution
Character Costs and Character Pays
Case Study: When Security Is on the Chopping Block
Chapter 3 To Serve and Protect
We Need You on That Wall
Know Your Why-Purpose and People
Service Means Sharing: Sharing Starts with Good Communication
Sharing with the Broader Cyber Community: We Are All on the Same Wall
Checking In
A Final Example
Case Study: Responsible Disclosure of a Security Flaw
Chapter 4 "Zero-Day" Humanity and Accountability
Bad Decisions and Multiplication
Humans Are Flawed
Turning Vulnerability into Strength: It Begins with Humility
Being a Lifelong Learner
Handling the Mistakes of Others
Let's Try to Avoid "Breaking Bad"
How to Develop a Reflective Practice
Case Study: To Pay or Not to Pay-A Ransomware Quandary
Chapter 5 It Begins and Ends with Trust
The Secret of Success
Trust Is the Currency of Cybersecurity
How Trust Is Built
When Things Go Bad
Building Trust Requires Courage
The Role of Leadership in Building a Culture of Trust
A Checklist for Building Trust
Case Study: A Matter of Trust and Data Breaches
Chapter 6 There Is Strength in the Pack
No Room for Know-it-Alls
Making Informed Ethical Decisions with Input
Why Teamwork Really Does Make the Dream Work
When Collaboration Breaks Down-Seeking Allies in Your Organization
The Power of Mentors
Beware of Rattlesnakes
Case Study: Graded on a Curve? The Security Audit Checkmark
Chapter 7 Practicing Cyber Kung Fu
Essential to Success: Patience, Wisdom, and Self-Control
Remember the Titanic
A Few Principles for Emergency Planning
Stay Calm, Cool, and Collected
Our Job Is Not Revenge
Develop Your Cyber Kung Fu
Case Study: An Open Door: Vigilante Justice
Chapter 8 No Sticky Fingers Allowed
If It's Free, It's for Me?
Avoid a "Robin Hood" Narrative
A Tragedy of "Free Information"
Intellectual Property Is Property
To Catch a Thief, We Must Train Like One
Choices Have Consequences
All I Really Need to Know I Learned in Kindergarten
Case Study: Something Borrowed and Something New
Chapter 9 It's None of Your Business
Curiosity Can Kill the Cat
Also listed under
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?