From the course: Ethics in Cybersecurity
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Handling sensitive information
From the course: Ethics in Cybersecurity
Handling sensitive information
Cybersecurity professionals often gain access to sensitive data. This includes everything from intellectual property to personally identifiable information. Ethical cybersecurity professionals understand how to manage that access with discretion. Don't let your curiosity get the best of you. When you work as a forensics analyst or a penetration tester, gaining unauthorized access to sensitive data is part of the job. The same holds true for security admins who have access to logging systems or security information and event management systems. With the right log data, you can recreate what a user was doing, as if you were watching over their shoulder as they were working on their laptop. And trust me when I tell you that working in forensics means that you'll learn things about people that you wish you hadn't. While your responsibilities dictate a need to access this information, the ethical thing to do is to restrain yourself from abusing that access. So here's our first situation…