Chapter 1: The Information Security Environment Flashcards
Code of ethics?
A code of ethics provides guidance to staff on
ethical standards and how to achieve them, as well as details on the organization’s values and vision and how they plan to implement them.
Code of ethics - examples?
The Ten Commandments, the Declaration of Geneva, the Hippocratic Oath, …
Professional Ethics.
A code of ethics serves as a guide to the principles that are designed to help professionals conduct business with honesty and integrity.
In many cases, professional ethics will be based on local and international legislation, standards, religious code, and heritage.
Enron & SOX
Arthur Andersen was providing Enron with both business consulting and audit services. This is usually perceived as an inherent conflict of interest.
In the middle of an investigation by regulators, Arthur Andersen executives ordered Arthur Andersen employees to shred thousands of pages of documents and delete volumes of electronic data detailing its audit services to Enron.
Arthur Andersen’s viability as a business was lost, and it ceased auditing operations.
SOX was created in response to this affair.
Sarbanes–Oxley Act
SOX
Congress created the Sarbanes–Oxley Act
(SOX) and amended the Federal Rules of Evidence.
SOX requires a greater level of transparency in financial reporting by publicly traded corporations.
Data owner cannot delete or destroy any information (physical or electronic) once the data owner receives notice of a pending legal action or investigation.
CIA Triad
Maintaining the confidentiality, integrity, and availability of assets is the basic goal of information security.
Confidentiality
Confidentiality is generally interpreted to mean
that unauthorized disclosure of information (to someone who does not have a valid need to know) can potentially cause harm to the owner and holder of the information.
Integrity
Data is kept free from unauthorized modifications throughout the life of that data.
Availability
Data is available when it is needed, where it is needed, and in the form that is needed.
Authenticity
Authentic information is genuine - it comes from a trusted authority, in a trustworthy, reliable, and verifiable fashion.
Non-repudiation
Non-repudiation is the ability of a system to prevent, deny, and detect attempts to deny the authorship, integrity, transmission, or modification of information
within or leaving that system.
Privacy
An individual’s right to privacy means that what they do
in a private place, what they say to someone else, or what they write down and keep from public view cannot be forcibly taken from them by others without the due process of law.
The right to privacy is a basic human right; it is mentioned in over 150 national constitutions.
In 1948, the United Nations adopted the Universal Declaration of Human Rights.
In 1980, the OECD published its Privacy Guidelines. Protecting the data that could be used to identify that person, their personally identifiable information (PII), is the basis of maintaining the individual’s right to privacy.
In 2018, EU General Data Protection Regulation (GDPR) is considered by many to be a turning point in the approach to privacy on both a legislative and an organizational level.
Due care
Due care requires a person to take all reasonable and prudent actions to plan and carry out any task or responsibility assigned to them.
Due diligence
Due diligence requires a person to take all reasonable and prudent actions to monitor, control, manage, and, as necessary, redirect or alter the plans and actions they are responsible for.
Prudent actions
Prudent actions are generally considered as those that other people with similar backgrounds of experience, education, and authority would take in the same circumstances.