Chapter 3 Flashcards
– Is the Nation’s cryptologic organization
– Protects US information systems
– Produces foreign intelligence information
– Responsible for signal intelligence and information system security
National Security Agency (NSA)
Major IT Professional Organizations
- Association of Computing Machinery
- International Information Systems Security Certification Consortium, Inc
- System Administration, Networking, Security Institute
- Information Systems Audit and Control Association
- Information Systems Security Association
The leader in development and implementation of information security legislation?
United States of America
– Established in 1947 as “the world’s first educational and scientific computing society”
– Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others’ privacy, and respecting others’ intellectual property
*Association of Computing Machinery (ACM)
Certification Consortium, Inc. (ISC)2
– Nonprofit organization focusing on development and implementation of information security certifications and credentials
– Code primarily designed for information security
professionals who have certification from (ISC)2
– Code of ethics focuses on four mandatory canons
International Information Systems Security
body of expectations that describe
acceptable and unacceptable employee behaviors
in the workplace
Policies
regulates structure/administration of
government agencies and relationships with
citizens, employees, and other governments
Public
Seeks to improve reliability and accuracy of
financial reporting and increase the accountability of corporate governance.
Sarbanes-Oxley Act of 2002
rules that mandate or prohibit certain
societal behavior
Law
fixed moral attitudes or customs of
a particular group; ethics based on these.
Cultural Mores
addresses violations harmful to society;
actively enforced by the state
Criminal
What is the difference of law and policy?
Ignorance of a
policy is an acceptable defense.
regulates relationships between individuals
and organizations.
Private
– Maintains an intrusion alert network
– Maintains a secure Web site for communication
about suspicious activity or intrusions
– Sponsors local chapter activities
– Operates a help desk for questions
Federal Bureau of Investigation’s National
InfraGard Program
– Professional association with focus on auditing, control, and security
– Concentrates on providing IT control practices and standards
– ISACA has code of ethics for its professionals
Information Systems Audit and Control Association (ISACA)
5 issues covered by Agreement on Trade-Related Aspects of Intellectual Property Rights
– Application of basic principles of trading system and international intellectual property agreements
– Giving adequate protection to intellectual property rights
– Enforcement of those rights by countries in their own territories
– Settling intellectual property disputes
– Transitional arrangements while new system is being introduced
“occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes”
Identity Theft
provides law enforcement agencies with broader latitude in order to combat terrorism-related activities
USA PATRIOT Act of 2001
Export and Espionage Laws
- Economic Espionage Act of 1996 (EEA)
- Security And Freedom Through Encryption Act of 1999 (SAFE)
- The acts include provisions about encryption that:
– Reinforce the right to use or sell encryption
algorithms, without concern of key registration
– Prohibit the federal government from requiring it
– Make it not probable cause in criminal activity
– Relax export restrictions
– Additional penalties for using it in a crime
Examples of Criminal Cases
- Murder.
- Robbery.
- Treason.
- Rape.
- Kidnapping.
- Establishes international task force overseeing
Internet security functions for standardized
international technology laws - Attempts to improve effectiveness of international
investigations into breaches of technology law - Well received by intellectual property rights
advocates due to emphasis on copyright
infringement prosecution - Lacks realistic provisions for enforcement
European Council Cyber-Crime
Convention
legal obligation of an entity extending
beyond criminal or contract law; includes legal
obligation to make restitution
Liability
best method for preventing an illegal or
unethical activity; e.g., laws, policies, technical
controls
Deterrence