Uploaded by Sanket Deshmukh

SPG 2

advertisement
SPG | Unit-2
1) What is the best method for preventing illegal or unethical
behavior?
Deterrence is th e best method for preventing an illegal or unethical activity.
Laws, policies, and technical controls are all examples of deterrents. However,
laws and policies and th eir associated penalties only deter if th ree conditions
are
present.
1. Fear of penalty- Threats of informal reprimand or verbal warnings may not
have the same impact as the threat of termination, imprisonment, or forfeiture
of pay.
2. Probability of being caught- There must be a strong possibility that
perpetrators
of illegal or unethical acts will be caught.
3. Probability of penalty being administered- The organization must be willing
and
able to impose the penalty.
2) Of the professional organizations discussed in this chapter,
which has been in existence the longest time? When was it
founded?
The ACM (www.acm.org), a well-respected professional society, was
established in 1947 as the world's first educational and scientific computing
society. It is one of the few organizations that strongly promotes education
and provide discounted membership for students. The ACM's code of ethics
requires members to perform their duties in a manner befitting an ethical
computing professional. The code contains specific references to protecting
the confidentiality of information, causing no harm (with specific references to
viruses), protecting the privacy of others, and respecting the intellectual
property and copyrights of others. The ACM also publishes a wide variety of
professional computing publications, including the highly regarded
Communications
of the ACM.
3) Of the professional organizations discussed in this chapter,
which is focused on auditing and control?
The (!SC)' (www.iscz.org) is a nonprofit organization that focuses on the
development
and implementation of InfoSec certifications and credentials. The (!SC)'
manages a body of knowledge on InfoSec and administers and evaluates
examinations for InfoSec certifications. The code of ethics put forth by (!SC)'
is primarily designed for InfoSec professionals who have earned one of their
certifications.
This code includes four mandatory canons:
• Protect society, the common good, necessary public trust and confidence,
and the
infrastructure.
• Act honorably, honestly, justly, responsibly, and legally.
• Provide diligent and competent service to principals.
• Advance and protect the profession.s
Through this code, (!SC)' seeks to provide sound guidance that will enable
reliance on the ethicality and trustworthiness of the InfoSec professional as
the guardian of the information and systems.
4) What is the stated purpose of the SANS organization? In what
ways is it involved in professional certification for InfoSec
professionals?
Founded in 1989, SANS (www.sans.org) is a professional research and
education cooperative organization. The organization, which enjoys a large
professional membership, is dedicated to the protection of information and
systems. SANS has a core IT code of ethics for all certificate holders that
includes the following tenets:
• I will strive to know myself and be honest about my capability.
• I will conduct my business in a manner that assures the IT profession is
considered
one of integrity and professionalism.
• I respect privacy and confidentiality. 6
Individuals who seek one of SANS's Global Information Assurance
Certification
(GIAC) credentials must agree to comply with a supplemental code of ethics,
which
opens with the following:
Respect for the Public
5) What is the difference between criminal law and civil law?
Criminal Law
Civil Law
Criminal Law deals with offences that
are committed against the society.
Civil Law is a general law. It solves
disputes between 2 organisations
or individuals.
To settle the dispute, a
The punishment of the offence would be
compensation is provided to the
as per the seriousness of the criminal
aggrieved party in civil law cases.
offence committed. Also, a fine could be
No such punishment is given in
imposed.
such cases.
In the case of Criminal law it the
Government of India that needs to file
the petition.
Civil Law to exist needs the
aggrieved individual or
organisation.
Criminal law punishes the convicts,
protects the citizens and ensures law
and order in the land.
The objective of Civil Law is to
protect the rights of an individual or
organisation. It needs to ensure the
wrongs done to be rectified against
the sufferer.
The petition cannot be filed directly in a
court but a complaint must be first
registered with the police and its
investigation needs to be carried out.
Thereafter a case can be filed in the
court.
The aggrieved party can file a case
in a tribunal or a court
The accused is prosecuted in the court
of law
The victim or aggrieved party can
sue those who offended it
In these cases the court is empowered
charge a fine, imprison the guilty of a
crime, or discharge the defendant.
The court in such cases can only
pass judgement to compensate for
damage done to the aggrieved
party.
Here, the defendant is considered either The defendant here is considered
guilty or not guilty by the court.
to be either liable or not liable.
Criminal law deals with specific serious
crimes like murder, rape, robbery etc.
Civil Law deals with Property,
Money, Housing, Divorce, custody
of a child in the event of divorce
etc.
6) What is tort law and what does it permit an individual to do?
Civil law embodies a wide variety of laws pertaining to relationships between
and among individuals and organizations. Civil law includes contract law,
employment law, family law, and tort law. Tort law is the subset of civil law
that allows individuals to seek redress in the event of personal, physical, or
financial injury. Perceived damages within civil law are pursued in civil court
and are not prosecuted by the state.
Different Types of Tort Claims

Intentional Torts

Unintentional Torts

Strict Liability Torts
8) What are the three primary types of public law?
Public Law includes criminal law, administrative law, and constitutional law.
Criminal law is defined as a body of rules and statutes that defines conduct
prohibited by the government because it threatens and harms public safety
and welfare and that establishes punishment to be imposed for the
commission of such acts. This term general refers to substantive criminal laws,
which are laws that define crime and can establish punishments. Based on
their nature, crimes are categorized as felonies or misdemeanors. Laws
passed by congress or a state must define crimes with certainty. This means
that both the courts and citizens have a clear understanding of a criminal
law’s requirements and prohibitions. The elements of a criminal law must be
stated explicitly, and the statute must embody some reasonably discoverable
standard of guilt.
Administrative law is the branch of law governing the creation and operation
of administrative agencies. This branch of law includes the powers granted to
administrative agencies, substantive rules that such agencies make, and the
legal relationship between such agencies, other government bodies, and the
public at large. Administrative law includes the laws and legal principles that
govern the administrative and regulation of government agencies, both
Federal and State). Governmental agencies must act within Constitutional
parameters.
Constitutional law is the written text of the state and federal constitutions.
The body of judicial precedent that has gradually developed through a
process in which courts interpret, apply, and explain the meaning of particular
constitutional provisions and principles during a legal proceeding.
Constitutional law includes executive, legislative, and judicial actions that
conform with the norms prescribed by a constitutional provision. A state of
federal law is said to be constitutional when its consistent with the text of a
constitutional provision and any relevant judicial interpretations. A law that is
inconsistent with either the written text or judicial interpretation of a
constitutional provision is unconstitutional.
9) Which law amended the Computer Fraud and Abuse Act of 1986,
and what did it change?
The Computer Fraud and Abuse (CFA) Act of 1986, presented in the following
Offline box, is the cornerstone of many computer-related federal Jaws and
enforcement efforts. It was amended in October 1996 by the National
Information Infrastructure
Protection Act of 1996, which modified several sections of the previous act
and increased the penalties for selected crimes. Punishment for offenses
prosecuted underthis statute varies from fines to imprisonment for up to 20
years or can include both.The penalty depends on the value of the information
obtained and whether the offenseis judged to have been committed for one of
the following reasons:
• For purposes of commercial advantage
• For private financial gain
• In furtherance of a criminal act
10) What is the USA PATRIOT Act? When was it initially
established and when was it significantly modified?
The USA PATRIOT Act was enacted in response to the attacks of September
11, 2001, and became law less than two months after those attacks.
The purpose of the USA PATRIOT Act is to deter and punish terrorist acts in
the United States and around the world, to enhance law enforcement
investigatory tools, and other purposes, some of which include:




To strengthen U.S. measures to prevent, detect and prosecute
international money laundering and financing of terrorism;
To subject to special scrutiny foreign jurisdictions, foreign financial
institutions, and classes of international transactions or types of accounts
that are susceptible to criminal abuse;
To require all appropriate elements of the financial services industry to
report potential money laundering;
To strengthen measures to prevent use of the U.S. financial system for
personal gain by corrupt foreign officials and facilitate repatriation of
stolen assets to the citizens of countries to whom such assets belong.
Some of the laws modified by the USA PATRIOT Act are among the earliest
laws created to deal with electronic technology. Certain portions of the USA
PATRlOT Act were extended in 2006, 2010, and 2011.
11) what is privacy in the context of information security?
privacy In the context of information security, the right of individuals or groups
to protect themselves and their information from unauthorized access,
providing
Confidentiality.
In the context of information security, social engineering is
used by attackers to gain system access or information that may lead to
system access.There are several social engineering techniques, which
usually involve a perpetrator posing as a person who is higher in the
organizational hierarchy than the victim.
12) What is another name for the Kennedy- Kassebaum Act
(1996), and why is it important to organizations that are not in the
health care industry?
The Health Insurance Portability and Accountability Act (HIPAA) of 1996,
also known as the Kennedy-Kassebaum Act, attempts to protect the
confidentiality and security of health care data by establishing and enforcing
standards and by standardizing electronic data interchange. HIPAA affects all
health care organizations, including small medical practices, health clinics, life
insurers, and universities, as well as some organizations that have selfinsured employee health programs. It provides for stiff penalties for
organizations that fail to comply with the law, with up to $250,000 and/or 10
years imprisonment for knowingly misusing client information. Organizations
were required to comply with the act as of April 14, 2003.
13) If you work for a financial service organization (such as a bank
or credit union), which law from 1999 affects your use of customer
data? What other effects does it have?
14) Which 1997 law provides guidance on the use of encryption?
The Security and Freedom Through Encryption (SAFE) Act of 1997 provides
guidance on the use of encryption and institutes measures of public protection
from government intervention. Specifically, the act:
• Reinforces an individual's right to use or sell encryption algorithms without
concern for the impact of other regulations requiring some form of key
registration. Key registration is when a cryptographic key (or its text equivalent)
is stored with another party to be used to break the encryption of the data
under
some circumstances. This is often called key escrow.
• Prohibits the federal government from requiring the use of encryption for
contracts, grants, other official documents, and correspondence.
• States that the use of encryption is not probable cause to suspect criminal
activity.
• Relaxes export restrictions by amending the Export Administration Act of
1979.
• Provides additional penalties for the use of encryption in the commission of a
criminal act.
15) What is intellectual property? Is it offered the same protection
in every country? What laws currently protect intellectual property
in the United States and Europe?
Intellectual property rights are the rights given to persons over the creations of
their minds. They usually give the creator an exclusive right over the use of
his/her creation for a certain period of time.Many organizations create or
support the development of intellectual property (IP) as part of their business
operations. Intellectual property can be trade secrets, copyrights,
trademarks, and patents. IP is protected by copyright and other Jaws, carries
the expectation of proper attribution or credit to its source, and potentially
requires the acquisition of permission for its use, as specified in those Jaws.
For example, the use of a song in a movie or a photo in a publication may
require a specific payment or royalty.
16) What is a policy? How does it differ from a law?
Policies are rules, principles, guidelines or frameworks that are adopted or
designed by an organization to achieve long term goals. These are usually set
out in a written format that is easily accessible. Policies are formulated to
direct and exert influence on all the major decisions to be made within the
organization and keep all activities within a set of established boundaries.
Policies are only documents and not law, but these policies can lead to new
laws. Laws are set standards, principles, and procedures that must be
followed in society. ... Policies can be called a set of rules that guide any
government or any organization. Laws are administered through the courts.
17) What is due care? Why would an organization want to make
sure it exercises due care in its usual course of operations?
due care Measures that an organization takes to ensure every employee
knows what is
acceptable and what is not.





Due of care is a fiduciary responsibility held by company directors
which requires them to live up to a certain standard of care.
The Due requires them to make decisions in good faith and in a
reasonably prudent manner.
The Due of care also applies to other roles within the financial industry,
including accountants, auditors, and manufacturers.
Failure to uphold the Due of care may result in legal action by
shareholders or clients.
Along with the Due of care, the other main fiduciary Due is the Due of
loyalty; the Due of loyalty seeks to prevent directors from acting against
the best interests of the corporation.
18) What should an organization do to deter someone from
violating policy or committing a crime?
Unethical behaviors can plague a workplace, whether an executive steals
money from the company or an associate falsifies documents. Unethical
behaviors can damage a company's credibility, causing the business to lose
customers and ultimately shut down. However, business owners and their
management teams can work with employees to prevent unethical behaviors.
19) What is digital forensics, and when is it used in a business
setting?
Investigations involving the preservation, identification, extraction,
documentation, and interpretation of computer media for evidentiary and
root cause analysis. Like traditional forensics, digital forensics follows clear,
well-defined methodologies but still tends to be as much art as science.Digital
forensics is based on the field of traditional forensics. Forensics allows
investigators to determine what happened by examining the results of an
event criminal, natural, intentional, or accidental. It also allows them to
determine how the event happened by examining activities, individual actions,
physical evidence, and testimony related to the event. What it may never do is
figure out the why.
Digital forensics involves applying traditional forensics methodologies to the
digital arena, focusing on information stored in an electronic format on any
one of a number of electronic devices th at range from computers to mobile
phones to portable media. Like forensics, it follows clear, well-defined
methodologies but still tends to be as much art as science. This means the
natural curiosity and personal skill of the investigator play a key role in
discovering potential evidentiary material (EM), also known as items of
potential evidentiary value. An item does not become evidence until it is
formally admitted to evidence by a judge or other ruling official.
20) What is evidentiary material?
Evidentiary material (EM) is known as "items of potential evidentiary value,"
any information that could potentially support the organization's legal or
policy-based case against a suspect. evidentiary material policy (EM policy)
The policy document that guides the development and implementation of EM
procedures regarding the collection, handling, and storage of items of
potential evidentiary value, as well as the organization and conduct of EM
collection teams.It is defined as a material used as evidence in front of a
judge at the time of interrogation. There are evidentiary rules related to
constituting of evidences. These are helpful in conducting the presentation
and determination of evidences. An example of something evidentiary be a
video tape that has been destroyed before presenting it in front the judge.
Related documents
Download