This is not a video presentation, it′s a power point presentation. When completing the presentation do bullet format, but explain the bullets in the notes below the slide) if you would like to talk through your bullet points instead of writing them, you can add in a audio recording. “Cyber ethics″ refers to the code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as ″Don′t take what doesn′t belong to you″ and ″Do not harm others,″ we must act responsibly in the cyber world as well. Research and download the following three tools: Nmap • Download page: https://nmap.org/download.html • Install instructions: https://nmap.org/book/install.html Network Miner • Download page: https://www.netresec.com/?page=NetworkMiner Crowd Response • Download page: https://www.crowdstrike.com/resources/community-tools/ I want to you take a side either for the ethical hacker, or for the hacker and state why these tools are okay to use for a security professional or for the hacker. Answer the following in the power point presentation: Steps for presenting an ethical argument or a defense of a moral judgment using ethical dialectic: 1. Position on the moral issues or dilemma made clear 2. Position defended using a. reasoning in support of the judgment (conclusion of the moral argument) b. Ethical Principles employed in the argument c. Values used to select the ethical principles used in defense of the conclusion (judgment) 3. Consideration of alternative positions and the rejection of those alternatives in favor of the judgment made for the reasons given which employ ethical principles and values. (The bullets below are breaking down number 3 for better clarification) Make sure the presentation includes the following questions answered on separate slides within the presentation: Why it is an ethical issue for the tool and why is it important to have ethics in cyber security? How do we as professionals, in the Cyber arena stay ethical? What are ways that we can improve Cyber ethics in the future?
