1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow.
CISSP stands for Certified Information Systems Security Professional. The ethical rules that CISSP holders have agreed to follow are
1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
2. Act honorably, honestly, justly, responsibly, and legally.
3. Provide diligent and competent service to principals.
4. Advance and protect the profession.
2. For what kind of information security jobs does the NASA recruit? Use the Internet to visit its Web page and find out.
Information technology specialist
Supervisory information technology specialist
3. Using the resources in your library, find out what laws your state has passed to prosecute computer crime.
Computer crimes, also called “cyber” crimes, can include:
Interference with another person’s computer access or use;
Use of a computer in a scheme to defraud;
Use of encryption in aid of a crime;
Improper access to a computer, system, or network;
Improper use, copy, modification, damage, or disclosure, of programs or data;
Introduction of a virus or other contaminant into a computer system or network;
Falsification of e-mail source information; or
Theft of information service from a provider.
4. Using the Web browser, go to www.eff.org. What are the current top concerns of this organization?
The Electronic Frontier Foundation seeks to protect the right of freedom of speech. One of their main concerns at the moment is SESTA. They are trying to send a message to the Congress and stop the new bill they are working on.
5. Using the ethical scenarios presented earlier in this chapter in the Offline feature called “The Use of Scenarios in Computer Ethics Studies,” finish each of the incomplete statements and bring your answers to class to compare them with those of your peers.
1. The programmer’s decision not to point out the design flaw was a poor decision on her part. She could have done better considering her skills and input.
2. The customer’s decision to keep the word-processing program was unmoral because he probably had the money to pay for it, or a similar word-processing program at home already. He should have contacted the vendor.
3. The student’s use of the company computer was intelligent because they had the programs the he needed and he did his homework during break times. Although, it could have been dangerous for the security and the integrity of the company’s private information since doing homework is not the purpose of those computers.