Bailey Johnson

ITS 370

CH 3

 

1.       What does CISSP stand for? Use the internet to identify the ethical rules CISSP holders have agreed to follow.     

It stands for Certified Information Systems Security Professional. Their code of ethics includes the promise to protect society the common good, necessary public trust and confidence, and the infrastructure. To act honorably, honestly, justly, responsibly and legally. To provide diligent and competent service to principles and to advance and protect the profession.                                                                                                                                                                        

2.       For what kind of information security jobs does the NSA recruit? Use the internet to visit its Web page and find out.

The have Information Assurance Engineers, Information Systems Security Specialists, Technical Counterintelligence Officers, Computer Network Defense Analysts, Computer Network Operators, Capabilities Development Specialists, and All Source Analysts.

3.       Using the resources in your library find out what laws your state has passed to prosecute computer crime.

Wisconsin statutes require that the offenders has to knowingly be hacking to be prosecuted. Any offenses against computer data and programs or computer equipment and supplies is considered a misdemeanor. On the other hand if the offense is to defraud or obtain property or caused damage greater than $2500 then it is considered a felony. In all cases the aggrieved party can sue. Also failed attempts are not considered a crime.

4.       Using a Web browser, go to www.eff.org. What are the current top concerns of this organization?

Well their overall concerns are to protect free speech, privacy, creativity and innovation, transparency, and security. What they are currently talking about is stopping DHS social media monitoring of immigrants, stopping the “Phish for the Future” which is a spear-phishing campaign, and stopping the border surveillance bill.

5.       Using the ethical scenarios presented earlier in this chapter in the Offline feature called “The Use of Scenarios in Computer Ethics Studies” finish each of the incomplete statements and bring your answers to class to compare them with those of your peers.

The scientist’s failure to acknowledge the computer programmer was unethical

The programmer’s decision not to point out the design flaws was very unethical

The student’s action in searching for the loophole was neither ethical nor unethical

The student’s action in continuing to access others’ records for two weeks was unethical

The system administrator’s failure to correct the problem sooner was neither ethical nor unethical

The customer’s decision to keep the word-processing program was neither ethical nor unethical

The programmer’s modification of the of the accounting system was ethical

The programmer’s weekend use of the company computer was neither ethical nor unethical

The student’s se of the company computer was neither ethical nor unethical

If the student had done her homework during company time her use of the company computer would have been unethical

If the student destroyed her copy of the software at the end of the term, her action in copying the software was ethical.  

If the student forgot to destroy her copy of the software at the end of the term her action in copying the software was neither ethical nor unethical.

If the student never intended to destroy her copy of the software at the end of the term her action in copying the software was unethical

The student’s actions in downloading the games were unethical

The student’s actions in downloading the programs were unethical

The student’s actions in sharing the programs and games with his friends were unethical.

The programmer’s position in this situation is ethical

The engineer’s position in this situation is unethical

The manager’s actions were very unethical

The student’s action of infecting hundreds of users’ flash drives was very unethical

If the virus program output the message “Have a nice day,” then the student’s action of infecting hundreds of users’ flash drives would have been unethical

If the virus erased files, then the student’s action of infecting hundreds of users’ flash drives would have been very unethical