3.1 Ethical conduct within cyber security