1.       What does CISSP stand for? Use the internet to identify the ethical rules CISSP holders have agreed to follow.

a.       Certified Information Systems Security Professional

                                                               i.      First Canon (Rule)

"protect society, the commonwealth, and the infrastructure." CISSPs must promote public trust in information and systems, as well as the understanding of proper information security measures.

                                                             ii.      Second Canon

"act honorably, honestly, justly, responsibly, and legally." CISSPs must tell the truth, as well as honor all commitments and agreements.

                                                           iii.      Third Canon

"provide diligent and competent service to principals." CISSPs must avoid conflicts of interest while respecting the trust placed in them, as well as the value of systems and information.

                                                           iv.      Fourth Canon

"advance and protect the profession." CISSPs must respect the reputations of other professionals and sponsor those best qualified for advancement. a CISSP should avoid association with those who degrade the profession. A CISSP should keep his own skills and knowledge sharp and current while giving generously of his time and knowledge to others.

2.       For what kind of information security jobs does the NSA recruit? Use the internet to visit its Web page and find out.

a.       Computer network operations

b.       Information systems security

c.       Vulnerability discovery

d.       Information assurance

e.       Project management

f.        Database management

g.       Telecommunications

h.       Real-time interfaces

i.         Information resource management

j.         Object-oriented programming

k.       Executive support

l.         Graphics

m.     Web design

3.       Using the resources in your library, find out what laws your state has passed to prosecute computer crime.

a.       943.70 (Wisconsin) Computer crime:

                                                               i.      Offenses against computer data and programs.

                                                             ii.      Whoever willfully, knowingly and without authorization does any of the following may be penalized as provided in pars.

                                                           iii.      Modifies data, computer programs or supporting documentation.

                                                           iv.      Destroys data, computer programs or supporting documentation.

                                                             v.      Accesses computer programs or supporting documentation.

                                                           vi.      Takes possession of data, computer programs or supporting documentation.

                                                          vii.      Copies data, computer programs or supporting documentation.

                                                        viii.      Discloses restricted access codes or other restricted access information to unauthorized persons.

                                                            ix.       Whoever intentionally causes an interruption in service by submitting a message, or multiple messages, to a computer, computer program, computer system, or computer network that exceeds the processing capacity of the computer, computer program, computer system, or computer network may be penalized as provided in pars.

4.       Using a Web browser, go to www.eff.org. What are the current top concerns of this organization?

a.       According to their website the top concerns are the free speech, fair use, innovation, privacy, international use, and transparency of internet use.

5.       Using the ethical scenarios presented earlier in this chapter in the Offline feature called “The Use of Scenarios in Computer Ethics Studies,” finish each of the incomplete statements and bring your answers to class to compare them with those of your peers.

a.       Unethical

b.       Very unethical

c.       Neither unethical or ethical

                                                               i.      Unethical

                                                             ii.      Neither unethical or ethical

d.       Unethical

e.       Unethical

f.        Ethical

g.       Ethical

                                                               i.      Unethical

h.       Ethical

                                                               i.      Unethical

                                                             ii.      Very unethical

i.         Neither unethical or ethical

                                                               i.      Neither unethical or ethical

j.         Very unethical

k.       Very unethical

                                                               i.      Very unethical

                                                             ii.      Very unethical