moral + access control matrix Flashcards
name Four ethical ‘isms’
moral realism, subjectivism, emotivism, prescriptivism
whys is it diffrent isms?
The different ‘isms’ regard the person uttering the statement as doing different things.
what is moral realism
statement about an ethical fact, ex it is wrong to murder
what is subjectivism
i make a staement about my own feeling
ex i disaprove for murder
what is emotivism
i express my feelings( its about dissaprove or approve) ex murder is wrong
what is prohibiation
i give instruktions or prohibitions, ex dont murder people
ethic vs law
name 3 things diffrent from each other
Law: written as docuemnt, ethics :described by unwritted documents
law: interpreted by court, ethical: interpreted by people
law: applicable by everyone ethics: personal choice
how to ethical reasoning? 4 step
1.understand situation
2. know ethical theories
3.list ethical principles
4. determine which princlie outweight others
policy should support
-report missbehaviour, property and information, how to use your it environemnt
ISACA principles
- support implemtation of and encourage compliance with standats, procedures and controll for information systems.
2.perform their duites with objectivity, due diligence and professional care in accordance with proffessional standars and best practice
- serve in the intrest of stakholders in a lawful and honest manner, while maintaing high standats of conduct and characters and not engage in acts discreditable to the profession
- maintain the privacy and confidentality of information obstained in the course of their duties unless disclosure is required by legal authories. such info shall not be used for personal benefit or released to inappropied parites
- Maintain competency in their respective fields and agree to undertake only those activities they can reasonably expect to complete with the necessary skills, knowledge and competence.
6.Inform appropriate parties of the results of work performed including the disclosure of all significant facts known to them that, if not disclosed, may distort the reporting of the results.
7.Support the professional education of stakeholders in enhancing their understanding of the governance and management of enterprise information systems and technology, including: audit, control, security and risk management.
why do we use isaca?
ISACA guide the professional and personal conduct of members of the association and/or its certification holders.
what is access control matrix describing?
describe protection state, rights of subjects, state transition
protection state do what?
descirbe the state of protection
what does acess control matrix model tell about rights
1)identify objects(file, subjects (ann) and actions(read, write, ececute)
what is state transmission
protection state is changing of the system