Security and Risk Management(5)

Ethics:

ISC Code of Ethics

  • You agree to this before the exam, and the code of ethics is very testable.
  • There are only four mandatory canons in the code. By necessity, such high-level guidance is not intended to be a substitute for the ethical judgment of the professional.

Code of Ethics Preamble:

  • The safety and welfare of society and the common good, the duty to our principles, and to each other, require that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
  • Therefore, strict adherence to this code is a condition of certification.

Code of Ethics Canons:

  • Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  • Act honorably, honestly, justly, responsibly, and legally.
  • Provide diligent and competent service to principles.
  • Advance and protect the profession.

Computer Ethics Institute

  • Ten Commandments of Computer Ethics:
    • Thou shalt not use a computer to harm other people.
    • Thou shalt not interfere with other people's computer work.
    • Thou shalt not snoop around in other people's computer files.
    • Thou shalt not use a computer to steal.
    • Thou shalt not use a computer to bear false witness.
    • Thou shalt not use copy or use proprietary software for which you have not paid.
    • Thou shalt not use other people's computer resources without authorization or proper compensation.
    • Thou shalt not appropriate other peoples' intellectual output.
    • Thou shalt think about the social consequences of the program you are writing or the system you are designing.
    • Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

 IAB's Ethics and the Internet

  • Defined as a Request For Comment(RFC), #1087 - Published in 1987
  • Considered unethical behavior:
    • Seeks to gain unauthorized access to the resources of the Internet.
    • Disrupts the intended use of the Internet.
    • Wastes resources(people, capacity, computer) through such actions:
      • Destroys the integrity of computer-based information.
      • Compromises the privacy of users.

Internal Code of Ethics of your organization

猜你喜欢

转载自www.cnblogs.com/keepmoving1113/p/12623444.html
今日推荐