Ethics in Cybersecurity
o Do you think the vulnerability(ies) exploited by the APT constitute an ethical failure by the defender? Why or why not?
o For the APT your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched?
o For the APT your group studied, when the targeted organization identified the breach, was the disclosure made with transparency? Do you feel the organization acted ethically? Why or why not?