A network of computers with rootkits that are secretly controlled by a cyber-attacker.
Published in Chapter:
The Ethics of Deception in Cyberspace
Neil C. Rowe (U.S. Naval Postgraduate School, USA)
Copyright: © 2009
|Pages: 13
DOI: 10.4018/978-1-60566-022-6.ch034
Abstract
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types of deception for defensive purposes, less well known, including honeypots, honeytokens, defensive obstructionism, false excuses, deceptive intelligence collection, and strategic deception. In each case we assess the ethical issues pro and con for the use of deception. We argue that sometimes deception in cyberspace is unethical and sometimes it is ethical.