Kyle Peterson

ITS-370

Chapter Three

9/29/17

Exercises

1.      What does CISSP stand for? Using the internet, identify the ethical rules CISSP holders have agreed to follow.

Certified Information Systems Security Professional (CISSP): is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC.

Rules for CISSP: It consists of four main “Canons”, each with differing sub sections.

·         First Canon: protect society, the commonwealth, and the infrastructure.

·         Second Canon: act honorably, honestly, justly, responsibly, and legally.

·         Third Canon: provide diligent and competent service to principals.

·         Fourth Canon: advance and protect the profession.

 

2.      What kind of Information Security Jobs does the NSA recruit?

The NSA offers a wide variety of jobs, each playing a vital role in keeping our country safe. Here are some of the important jobs listed:

·         Cryptologic Cyber Planner

·         Intelligence Analyst (Geographic/Regional Specialization)

·         Network Vulnerability Analyst

·         Computer Scientist

·         Computer Network Defense Analyst

·         Computer Network Operator

·         Capabilities Development Specialist

3.      What are some of the laws in Wisconsin that prosecute computer crime?

Wisconsin has a whole Legislature designed to target computer related crimes. This section is referred to as 943.70.

Many of the Violations include, but are not limited to:

·         Modifying or altering data without authorization.

·         Phishing for data.

·         Deliberately destroying data without permission.

·         Redistributing copyrighted materials without permission; Piracy.

·         Creating Fraudulent Emails in order to obtain data in unethical ways.

·         Installing programs on unauthorized systems without permission.

4.      What are some of the top concerns in regards to www.eff.org?

There is a plethora of different topics in which the average citizen might be concerned, these topics range from Equifax to Phishing Scams.

            Here’s a perfect example of such a problem: “Phish For The Future,” an advanced persistent spearphishing campaign targeting digital civil liberties activists at Free Press and Fight For the Future . Between July 7th and August 8th of 2017 we observed almost 70 spearphishing attempts against employees of internet freedom NGOs Fight for the Future and Free Press, all coming from the same attackers. This campaign appears to have been aimed at stealing credentials for various business services including Google, Dropbox, and LinkedIn. At least..”

*All quotes are from www.eff.org

      5. The use of Scenarios in Computer Ethic Studies:

·         One: Unethical, The computer programmer helped test the theories. As such proper acknowledgement should be given.

·         Two: Unethical, She knew about potential problems, but failed to report that they were present.

·         Three: Neither, Unethical, Neither. The crime was the unauthorized access after the crime was reported. He could have been a White hat hacker.

·         Four: Unethical, but I think anyone in their right mind would have done the same thing.

·         Five: Unethical, She deliberately changed the code so that she would not get charged.

·         Six: Ethical, He wasn’t doing it during worktime, and signed in making it obvious that he was present.

·         Seven: Ethical, She was doing it on break.

·         Eight: Unethical, Unethical, Very Unethical, She wasn’t supposed to copy it in the first place.

·         Nine: Unethical, Unethical, Very Unethical, Simple, it was Piracy.

·         Ten: Ethical, Unethical, This is a sticky situation regardless.

·         Eleven: Very Unethical, What she was doing was extremely wrong, and is actually considered a crime.

·         Twelve: There all Very Unethical. It’s a virus this is a no brainer.