Abstract
The authors provide the articulation of the ethical argument for the role of vulnerability researchers and security practitioners. They argue that, provided that these researchers don't themselves engage in conduct that causes harm, their conduct doesn't necessarily run afoul of ethical and legal considerations. Furthermore, creating effective defenses against cyberthreats requires vulnerability researchers and practitioners to master techniques such as network recognizance, reverse engineering, penetration testing, and vulnerability exploitation. Although some consider research employing such techniques unequivocally unethical and possibly illegal, a deep understanding in these areas is pivotal to understanding and mitigating the escalating cyberthreat. Using the case study of recent work done at Columbia University, the authors advocate for crafting a code of conduct for vulnerability researchers and security practitioners, including the implementation of procedural safeguards to ensure minimization of harm. They also propose some best practices in vulnerability research.
Original language | English (US) |
---|---|
Article number | 5439532 |
Pages (from-to) | 67-72 |
Number of pages | 6 |
Journal | IEEE Security and Privacy |
Volume | 8 |
Issue number | 2 |
DOIs | |
State | Published - Mar 2010 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law