Best Practices and Recommendations for Cybersecurity Service Providers

4Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers.

References Powered by Scopus

About penetration testing

0
102Citations
N/AReaders
Get full text

Virtuous human hacking: The ethics of social engineering in penetration-testing

27Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition

20Citations
N/AReaders
Get full text

Ethical Considerations in Maritime Cybersecurity Research

9Citations
N/AReaders
Get full text

CYBER SECURITY MANAGEMENT AND STRATEGIC INTELLIGENCE

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kirichenko, A., Christen, M., Grunow, F., & Herrmann, D. (2020). Best Practices and Recommendations for Cybersecurity Service Providers. In International Library of Ethics, Law and Technology (Vol. 21, pp. 299–316). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29053-5_15

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

83%

Researcher 1

17%

Readers' Discipline

Tooltip

Computer Science 3

43%

Economics, Econometrics and Finance 2

29%

Social Sciences 1

14%

Arts and Humanities 1

14%

Save time finding and organizing research with Mendeley

Sign up for free