1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Societies
Groups of people characterized by common interests and values that are perpetuated by persistent social interaction.
Ethics
The set of values and rules we adhere to as defined by the societies in which we live.
Political Structures
The relation between institutions and how they interact with one another and the laws and norms they present.
Institution
Informal norms, shared understandings, and formal doctrines that constrain and prescribe actors' interactions with one another..
Code of Ethics
An expression of values by designers and users in the institution of cybersecurity.
Ethical Reflection
The act of considering the potential harms, benefits, and trade-offs involved in cybersecurity.
Bad Actors (Cybercriminals)
Criminals that use cybersecurity unethically.
Security
The freedom from potential harm or other unwanted coercive change caused by others.
Transparency
The act of being open and honest about the security of a product and what is done with customer information.
Autonomy
The idea that every entity is in control of their own thoughts and actions.
Resilience
The ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions.
Ethical Obligations
Covenants that define a moral course of action and draw a line between right and wrong.
White Hat
Ethical hackers who are often paid employees or contractors at a company, working as security specialists.
Black Hat
Hackers that weaponize cybersecurity in an unethical and highly illegal manner.
Gray Hat
Hackers that exist in an area that overlaps both ethical and unethical practices.