Ethics & Law Part 2 Flashcards

(11 cards)

1
Q

True or False: IT and InfoSec do not have binding codes of ethics

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some professional organization for information security professionals?

A

ACM, ISACA, ISSA, SANS GIAC, EC-Council, (ISC)^2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Ten Commandments of Computer Ethics?

A
  1. Do not use a computer to harm other people.
  2. Do not interfere with other people’s computer work.
  3. Do not snoop around in other people’s computer files.
  4. Do not use a computer to steal.
  5. Do not use a computer to bear false witness.
  6. Do not copy or use proprietary software for which you have not paid.
  7. Do not use other people’s computer resources without authorization or proper
    compensation.
  8. Do not appropriate other people’s intellectual output.
  9. Think about the social consequences of the program you are writing or the system
    you are designing.
  10. Always use a computer in ways that ensure consideration and respect for your
    fellow humans.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of some ethical differences across cultures?

A

Different cultures many have different views in what is ethical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Employees must be trained and kept aware of the expected behaviors of an ethical employee

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three general causes if unethical and illegal behavior?

A
  1. Ignorance
  2. Accident
  3. Intentional
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best method for preventing illegal or unethical activity?

A

Deterrence (like technical controls, policies, laws)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the functions of the Department of Homeland Security (DHS)?

A
  • Protect the citizens as well as the physical and informational assets of the United States.
  • US-CERT provides mechanisms to report phishing and malware.
  • CISA – offers services to government, industry, and private sector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the U.S. Secret Service?

A

Protective services; charged with safeguarding the nation’s financial infrastructure and payments system to preserve integrity of economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the FBI?

A
  • Primary law enforcement agency that investigates traditional crimes and
    cybercrimes.
  • Key priorities include computer/network intrusions, identity theft, and fraud
    FBI’s National InfraGard Program
    1) Maintains an intrusion alert network
    2) Maintains a secure Web site for communication about suspicious activity or intrusions
    3) Sponsors local chapter activities
    4) Operates a help desk for questions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the National Security Agency (NSA)?

A
  • The nation’s cryptologic organization
  • Responsible for signal intelligence and information assurance (security)
  • Information Assurance Directorate (IAD) is responsible for the protection of systems that
    store, process, and transmit information of high national value.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly