(L)eadership

What was it?

A class within the Cybersecurity B.S. program is PHIL 355E which is Cybersecurity Ethics. This course covers various ethical theories and their application to cybersecurity issues, including privacy, digital rights, and professional responsibility. Ultimately, I ended up covering Utilitarianism, Ruism (Confucianism), Kantian Deontology, and Contractarianism.

How it Applies to Cybersecurity

Cybersecurity is not only a technical domain but a deeply ethical one. No matter how simple, every decision we make has some moral weight. My thinking has shifted from seeing cybersecurity as a technical checklist to viewing it as an ethical ecosystem where responsibility is shared, privacy is protected, and decisions made at scale ripple across the technological landscape.

Why it is important?

Ethics in cybersecurity is crucial because it guides professionals in making responsible decisions that impact individuals, organizations, and society at large. As technology continues to evolve and permeate every aspect of our lives, the ethical implications of cybersecurity practices become increasingly significant. Professionals must navigate complex issues such as data privacy, surveillance, and digital rights while balancing the needs of various stakeholders. By adhering to ethical principles, cybersecurity professionals can build trust, promote fairness, and ensure that their actions contribute positively to the digital ecosystem. Being able to lead by example in ethical behavior is essential for fostering a culture of integrity and accountability within the cybersecurity field. By committing myself to conduct myself in an ethical manner, and lead other professionals to do the same, I can help create a safer and more trustworthy digital environment for all.

Reflection

This course has profoundly influenced my perspective on cybersecurity by highlighting the ethical dimensions of the field. It has encouraged me to think critically about the consequences of my actions and the broader impact of cybersecurity practices on society. I have come to appreciate the importance of ethical decision-making in building a secure and trustworthy digital environment. This understanding will undoubtedly shape my approach to cybersecurity throughout my career, guiding me to prioritize not only technical excellence but also moral integrity in all my professional endeavors.

Work Samples

My highlighted work samples can be found here, including the ethic tools which I selected during my course, a paper using Kantian Deontology to examine information warfare, and final reflective paper:

Some course work, which was required to be presented for the class, can be found here. There is some overlap as my final reflection paper is also included in the work samples above. However, the page above includes two other papers regarding cyberwarefare and whistleblowing.

Showcasing Knowledge and Skills

Each of these work samples highlights different aspects of ethical theories and their application to cybersecurity issues. They showcase my skills in critical thinking, ethical analysis, and written communication, as well as my commitment to understanding the moral dimensions of cybersecurity.

Contribution to Professional Practice

As I adapt these ethical frameworks into my everyday thinking as well as my professional practice, I believe they will help me navigate the complex ethical challenges that arise in the field of cybersecurity. They will contribute to my development as a professional by providing me with a solid foundation for making responsible and ethical decisions in my career. Leadership in cybersecurity is not only about technical expertise but also about setting a moral example and fostering a culture of integrity within the field. There is no better way to lead than by example.