Computer science
If not, what ethically significant harms could result from the scenario your group researched?
Answers will need to be based off of attached pdf file “Background on threat analysis”.
Ethics in Cybersecurity
o Do you think the vulnerability(ies) exploited by the APT constitute an ethical failure by the defender? Why or why not?
o For the APT your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A triad (Confidentially, Integrity, Availability)? If not, what ethically significant harms could result from the scenario your group researched?
o For the APT your group studied, when the targeted organization identified the breach, was the disclosure made with transparency? Do you feel the organization acted ethically? Why or why not?