Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Western Governors University C 841 Legal Issues in Information Security Task 2

Beoordeling
-
Verkocht
-
Pagina's
7
Geüpload op
28-11-2022
Geschreven in
2022/2023

Western Governors University C 841 Legal Issues in Information Security Task 2.A1: Discussion of Ethical Guidelines or Standards: In regards to the TechFite case study, there are a number of relevant information security moral principles. First, all sensitive or proprietary information encountered on the job should be treated with respect and kept private. Second, professional responsibilities are to be discharged with integrity and diligence in accordance with all applicable laws. In addition, the professional reputations of coworkers, employers, and customers should not be intentionally slandered or brought into question. Moreover, all work should be conducted in a manner consistent with information security best practices. Finally, employees should not engage in any activities that may constitute a conflict of interest. A1a: Justification of Standards or Guidelines: All of these tenets can be found in the ethics policies of prominent organizations throughout the IT community. For example, the Information Systems Security Association International (ISSA) Code of Ethics echoes the sentiment that data privacy must be maintained (ISSA Code of Ethics, 2016). It also emphasizes the importance of industry best practices and prohibits relationships that could be construed as a conflict of interest (ISSA Code of Ethics, 2016). The International Information Systems Security Certification Consortium (ISC)² addresses professional responsibilities, stating that individuals should “act honorably, honestly, justly, responsibly, and legally” ((ISC)² Code of Ethics, 1996). The American Society for Industrial Security (ASIS) speaks to the issue of professional reputations, declaring that personnel must not “maliciously injure the professional reputation or practice of

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

C841 Legal Issues in Information Security Task 2 Page 1




Western Governors University
C841 Legal Issues in Information Security Task 2


A1: Discussion of Ethical Guidelines or Standards: In regards to the TechFite case

study, there are a number of relevant information security moral principles. First, all

sensitive or proprietary information encountered on the job should be treated with

respect and kept private. Second, professional responsibilities are to be discharged

with integrity and diligence in accordance with all applicable laws. In addition, the

professional reputations of coworkers, employers, and customers should not be

intentionally slandered or brought into question. Moreover, all work should be

conducted in a manner consistent with information security best practices. Finally,

employees should not engage in any activities that may constitute a conflict of interest.

A1a: Justification of Standards or Guidelines: All of these tenets can be found in the

ethics policies of prominent organizations throughout the IT community. For example, the

Information Systems Security Association International (ISSA) Code of Ethics echoes the

sentiment that data privacy must be maintained (ISSA Code of Ethics, 2016). It also

emphasizes the importance of industry best practices and prohibits relationships that could

be construed as a conflict of interest (ISSA Code of Ethics, 2016). The International

Information Systems Security Certification Consortium (ISC)² addresses professional

responsibilities, stating that individuals should “act honorably, honestly, justly, responsibly,

and legally” ((ISC)² Code of Ethics, 1996). The American Society for Industrial Security

(ASIS) speaks to the issue of professional reputations, declaring that personnel must not

“maliciously injure the professional reputation or practice of

, colleagues, clients, or employees” (ASIS Certification Code of

Professional Responsibility, 2018).

A2: Description of Unethical Behaviors: There were a number of individuals and groups

within TechFite whose behavior was unethical. The head of the Applications Division, Carl

Jaspers, failed to safeguard sensitive data, encouraged immoral surveillance techniques and

had a relationship with IT Security Analyst Nadia Johnson that represented a clear conflict of

interest. This relationship was a quid pro quo arrangement where Mr. Jaspers gave Ms.

Johnson gifts and positive reviews in exchange for not reporting the division’s

violations (Jackson, n.d., p. 2). Nadia Johnson accepted these bribes and

subsequently produced false reports that claimed there was no unusual activity within

the division (Jackson, n.d., p. 2). The Business Intelligence (BI) Unit within the

Applications Division accessed other divisions without authorization, viewed private

information without permission, mishandled customer data and performed penetration

tests without obtaining consent (Jackson, n.d., p. 3). Specifically, BI Unit employees

Sarah Miller, Jack Hudson, and Megan Rogers performed vulnerability scans of rival

company’s networks. In addition, Mr. Hudson “coordinates efforts by third parties to

gather intelligence through surveilling and through mining companies’ trash” (Jackson,

n.d., p. 3). Furthermore, the Marketing/Sales Unit did not perform proper separation of

duties and the Financial Unit neglected to audit their payment records.

A3: Factors: The most obvious issue is the lack of an established Code of Ethics at TechFite.

Employers often make the mistake of assuming their staff understand what conduct is

considered acceptable and will abide by these precepts without instruction. While in a perfect

world this would be true, in reality this is not the case. A formal policy must be

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
28 november 2022
Aantal pagina's
7
Geschreven in
2022/2023
Type
SAMENVATTING

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
StudyConnect Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
266
Lid sinds
5 jaar
Aantal volgers
232
Documenten
1719
Laatst verkocht
1 maand geleden
Study Connect

Latest Exams, Notes, Practice Tests And All Latest Study Materials to help You Pass your Exams

3.5

40 beoordelingen

5
15
4
7
3
9
2
0
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen