ISC² Code of Ethics Flashcards

1
Q

Code of Ethics Preamble:

A

 The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
 Therefore, strict adherence to this code is a condition of certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Code of Ethics Canons:

A

Protect society, the common good, necessary public trust and confidence, and the infrastructure.
 Act honorably, honestly, justly, responsibly, and legally.
 Provide diligent and competent service to principles.
Advance and protect the profession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ten Commandments of Computer Ethics:

A

 Thou shalt not use a computer to harm other people.
 Thou shalt not interfere with other people’s computer work.
 Thou shalt not snoop around in other people’s computer files.
 Thou shalt not use a computer to steal.
 Thou shalt not use a computer to bear false witness.
 Thou shalt not copy or use proprietary software for which you have not paid.
 Thou shalt not use other people’s’ computer resources without authorization or proper compensation.
 Thou shalt not appropriate other people’s’ intellectual output.
 Thou shalt think about the social consequences of the program you are writing or the system you are designing.
 Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security governance principles.

A
  • Values:
    * What are our values? Ethics, Principles, Beliefs.
  • Vision:
    * What do we aspire to be? Hope and Ambition.
  • Mission:
    * Who do we do it for? Motivation and Purpose.
  • Strategic Objectives:
    * How are we going to progress? Plans, goals, and sequencing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policies – Mandatory.

A

 High level, non-specific.
 They can contain “Patches, updates, strong encryption”
 They will not be specific to “OS, encryption type, vendor Technology”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Standards – Mandatory.

A

Describes a specific use of technology (All laptops are W10, 64bit, 8gig memory, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Guidelines – non-Mandatory.

A

Recommendations, discretionary – Suggestions on how you would to do it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Procedures – Mandatory

A

 Low level step-by-step guides, specific.

 They will contain “OS, encryption type, vendor Technology”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Baselines (Benchmarks) - Mandatory.

A

Benchmarks for server hardening, apps, network. Minimum requirement, we can implement stronger if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Awareness

A

Change user behavior - this is what we want, we want them to change their behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Training

A

Provides users with a skillset - this is nice, but if they ignore the knowledge, it does nothing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hiring Practices

A

We do background checks where we check: References, degrees, employment, criminal, credit history (less common, more costly). We have new staff sign a NDA (Non-Disclosure Agreement).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Employee Termination Practices

A

We want to coach and train employees before firing them. They get warnings.
 When terminating employees, we coordinate with HR to shut off access at the right time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vendors, Consultants and Contractor Security.

A

When we use outside people in our environments, we need to ensure they are trained on how to handle data. Their systems need to be secure enough for our policies and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Outsourcing and Offshoring

A

Having someone else do part of your (IT in our case) work.
 This can lower cost, but a thorough and accurate Risk Analysis must be performed. Offshoring can also pose problems with them not having to comply with the same data protection standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly