SlideShare a Scribd company logo
This Curious Thing
Called Ethics
William H. Murray CISSP
Dan Houser CISSP-ISSAP
Graham Jackson, JD
Mano Paul CSSLP
I am a Professional
•
Professional education.
•
Professional experience.
•
Professional work requiring special intellectual attainment and
discipline.
•
Share a body of professional knowledge with my colleagues.
•
Subscribe to ethical principles, behave in an ethical way, and set a
good example.
•
Responsibility to the common good, my clients, and my profession
ahead of personal interests.
•
Sign my work and take responsibility for the work of my
subordinates, colleagues, and associates.
I am a Security Professional
•
Special authority, responsibilities, and duties
•
Must not give unwarranted comfort or to raise
unnecessary alarm
•
Use privileges and capabilities as intended.
•
Professionals owe a duty of confidentiality
•
As a security professional, have a particular duty to
preserve the confidentiality of my principals' data.
I must not disclose it to others, including
government authorities, without their permission.
I am a CISSP
•
Subscribed to the Code of Ethics
•
Public good even ahead of those to my principals, those to
my principals ahead of those to my colleagues, and all of
those ahead of my own interests.
•
As a member of (ISC)² I can refer to the ethical guidance on
our web site to help me determine the greater of goods or
the lesser of evils.
•
If my principal fails to take my advice or engages in illegal
activity, I must take a walk and maintain my silence.
•
When all else fails me, I can consult with other professionals.
Controls
•
Application Review
•
Endorsements
•
Committee review
•
Complaint Procedure
•
Committee Recommendation
•
Appeal
Your Responsibility
•
Subscribe to the Code
•
Familiarize yourself with the guidance
•
Resolve dilemmas (greater of goods, lesser of
evils)
•
Consult with and support your colleagues
•
Professional Development
•
Review and endorse Applications
•
Report violations
Case Study 1
Amanda, a CSSLP, files a compliant. Brian, a
CISSP, is an independent consultant, and was
retained to perform a network and system
assessment to PCI-DSS standards. Amanda
states that the work was slipshod and did not
appropriately reflect the standards. Amanda
asserts that the work did not demonstrate an
ethical amount of due care.
Case Study 1a
Amanda provides further documents showing 3
signatures on compliance documents that she
states were forged, and that the signatures do
not match those of the principals. When
contacted, Brian states that he received verbal
permission to sign the documents on their
behalf to meet an urgent filing deadline, so he
forged the three signatures.
Case Study 2
Cindy is a student in a CSSLP curriculum who is
caught by campus security, having compromised
the security of some of her school’s servers. The
school states this was without notice or
permission. Cindy states that she was
conducting a pen test for a science fair project
on network security. She has documents
showing her plan, but no documents providing
permission.
Case Study 2a
Cindy provides documentation from her teacher
that they were to have arranged for a scope of
effort document and permission letter from the
school. Cindy started her scan as scheduled, but
did not wait for the letter and permission.
Case Study 3
Daryl is a CISSP who has self-published a general
security book. Emily files a complaint, and
shows that Daryl had copied 12 pages, verbatim,
from a book she had published two years prior.
Emily shows that the text contained no
attribution.
Case Study 3a
Daryl responds to the allegations showing that
the text had attribution as an endnote and was
listed in the forward of the book and the
bibliography.
Case Study 4
Frank is a CISSP who has conducted a certification &
accreditation assessment for a new system and
documented 40 high risk issues in the certification
report. After signoff on the certification report, one of
certifiers modifies the document, moving most “high
risk” issues to show them as “resolved”. It is the
modified version which is used for accreditation
signoff.
Case Study 4a
Frank takes the original and changed documents to the
InfoSec VP, a CISSP, who does not want to “make
waves”, and the issue goes unchallenged.
Frank takes the issue to the Ethics & Compliance
Hotline, and they decline to take up the case because
it’s not concerning customer data.
Frank has signed an NDA, and audit results are
classified as Company Confidential.
Bill Murray
email
Dan Houser
dan.houser@isc2.org
@SecWonk
Graham Jackson
gjackson@isc2.org
Mano Paul
email

More Related Content

Similar to 2013 (ISC)² Congress: This Curious Thing Called Ethics

Topic Volkswagens huge diesel scandal.You should be research.docx
Topic Volkswagens huge diesel scandal.You should be research.docxTopic Volkswagens huge diesel scandal.You should be research.docx
Topic Volkswagens huge diesel scandal.You should be research.docx
edwardmarivel
 
Employee selection
Employee selectionEmployee selection
Employee selection
Sheikh Muhammad Saud
 
Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...
Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...
Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...
Linda Austin
 
MGMT 560 – Organizational Leadership Ethics and Profes
MGMT 560 – Organizational Leadership Ethics and ProfesMGMT 560 – Organizational Leadership Ethics and Profes
MGMT 560 – Organizational Leadership Ethics and Profes
DioneWang844
 
Diamond Datascram Decimated
Diamond Datascram DecimatedDiamond Datascram Decimated
Diamond Datascram Decimated
Polsinelli PC
 
Tink Palmer,MCF, Presentation for day workshop.
Tink Palmer,MCF,  Presentation for day workshop. Tink Palmer,MCF,  Presentation for day workshop.
Tink Palmer,MCF, Presentation for day workshop.
mckenln
 
Ethics ii final version-2-16-07
Ethics ii final version-2-16-07Ethics ii final version-2-16-07
Ethics ii final version-2-16-07
pegart
 
Justice or Just Us: Understanding Bias and Managing Health Professional Lice...
Justice or Just Us:  Understanding Bias and Managing Health Professional Lice...Justice or Just Us:  Understanding Bias and Managing Health Professional Lice...
Justice or Just Us: Understanding Bias and Managing Health Professional Lice...
Harry Nelson
 
MOD 1Ethical Decision MakingStart by reading and following the.docx
MOD 1Ethical Decision MakingStart by reading and following the.docxMOD 1Ethical Decision MakingStart by reading and following the.docx
MOD 1Ethical Decision MakingStart by reading and following the.docx
roushhsiu
 
Ethics in Public Relations District Conference
Ethics in Public Relations District ConferenceEthics in Public Relations District Conference
Ethics in Public Relations District Conference
Janelle Guthrie, APR
 
Janelle guthrie ethics in public relations district conference
Janelle guthrie   ethics in public relations district conferenceJanelle guthrie   ethics in public relations district conference
Janelle guthrie ethics in public relations district conference
prsanpd
 
Finding Your Ethical Compass
 Finding Your Ethical Compass Finding Your Ethical Compass
Finding Your Ethical Compass
prsanpd
 
Managing ethical-dilemmas
Managing ethical-dilemmasManaging ethical-dilemmas
Managing ethical-dilemmas
kerrigans
 
Ethics, Integrity and Trust
Ethics, Integrity and TrustEthics, Integrity and Trust
Ethics, Integrity and Trust
McKonly & Asbury, LLP
 
emotional support animals where is the animal live free.pptx
emotional support animals where is the animal live free.pptxemotional support animals where is the animal live free.pptx
emotional support animals where is the animal live free.pptx
adamhales9001
 
emotional support animals lecture1professionalethics1-240316174041-0516c929.pdf
emotional support animals lecture1professionalethics1-240316174041-0516c929.pdfemotional support animals lecture1professionalethics1-240316174041-0516c929.pdf
emotional support animals lecture1professionalethics1-240316174041-0516c929.pdf
adamhales9001
 
CLE COURSE Ethical Issues in Supervising Others Can Their Misconduct B ETH4800
CLE COURSE Ethical Issues in Supervising Others  Can Their Misconduct B ETH4800CLE COURSE Ethical Issues in Supervising Others  Can Their Misconduct B ETH4800
CLE COURSE Ethical Issues in Supervising Others Can Their Misconduct B ETH4800
Missy Cruz
 
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docxPrepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
harrisonhoward80223
 
ETHICAL DECISIONSMOD 4Start by reading and following these ins.docx
ETHICAL DECISIONSMOD 4Start by reading and following these ins.docxETHICAL DECISIONSMOD 4Start by reading and following these ins.docx
ETHICAL DECISIONSMOD 4Start by reading and following these ins.docx
elbanglis
 
L1 Work Readiness & Employment Bk Ck
L1 Work Readiness & Employment Bk CkL1 Work Readiness & Employment Bk Ck
L1 Work Readiness & Employment Bk Ck
WorkOne West Central Indiana, Region 4
 

Similar to 2013 (ISC)² Congress: This Curious Thing Called Ethics (20)

Topic Volkswagens huge diesel scandal.You should be research.docx
Topic Volkswagens huge diesel scandal.You should be research.docxTopic Volkswagens huge diesel scandal.You should be research.docx
Topic Volkswagens huge diesel scandal.You should be research.docx
 
Employee selection
Employee selectionEmployee selection
Employee selection
 
Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...
Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...
Writing a Case-Study Memo - JNL-2105 - Journalism Ethics - Professor Linda Au...
 
MGMT 560 – Organizational Leadership Ethics and Profes
MGMT 560 – Organizational Leadership Ethics and ProfesMGMT 560 – Organizational Leadership Ethics and Profes
MGMT 560 – Organizational Leadership Ethics and Profes
 
Diamond Datascram Decimated
Diamond Datascram DecimatedDiamond Datascram Decimated
Diamond Datascram Decimated
 
Tink Palmer,MCF, Presentation for day workshop.
Tink Palmer,MCF,  Presentation for day workshop. Tink Palmer,MCF,  Presentation for day workshop.
Tink Palmer,MCF, Presentation for day workshop.
 
Ethics ii final version-2-16-07
Ethics ii final version-2-16-07Ethics ii final version-2-16-07
Ethics ii final version-2-16-07
 
Justice or Just Us: Understanding Bias and Managing Health Professional Lice...
Justice or Just Us:  Understanding Bias and Managing Health Professional Lice...Justice or Just Us:  Understanding Bias and Managing Health Professional Lice...
Justice or Just Us: Understanding Bias and Managing Health Professional Lice...
 
MOD 1Ethical Decision MakingStart by reading and following the.docx
MOD 1Ethical Decision MakingStart by reading and following the.docxMOD 1Ethical Decision MakingStart by reading and following the.docx
MOD 1Ethical Decision MakingStart by reading and following the.docx
 
Ethics in Public Relations District Conference
Ethics in Public Relations District ConferenceEthics in Public Relations District Conference
Ethics in Public Relations District Conference
 
Janelle guthrie ethics in public relations district conference
Janelle guthrie   ethics in public relations district conferenceJanelle guthrie   ethics in public relations district conference
Janelle guthrie ethics in public relations district conference
 
Finding Your Ethical Compass
 Finding Your Ethical Compass Finding Your Ethical Compass
Finding Your Ethical Compass
 
Managing ethical-dilemmas
Managing ethical-dilemmasManaging ethical-dilemmas
Managing ethical-dilemmas
 
Ethics, Integrity and Trust
Ethics, Integrity and TrustEthics, Integrity and Trust
Ethics, Integrity and Trust
 
emotional support animals where is the animal live free.pptx
emotional support animals where is the animal live free.pptxemotional support animals where is the animal live free.pptx
emotional support animals where is the animal live free.pptx
 
emotional support animals lecture1professionalethics1-240316174041-0516c929.pdf
emotional support animals lecture1professionalethics1-240316174041-0516c929.pdfemotional support animals lecture1professionalethics1-240316174041-0516c929.pdf
emotional support animals lecture1professionalethics1-240316174041-0516c929.pdf
 
CLE COURSE Ethical Issues in Supervising Others Can Their Misconduct B ETH4800
CLE COURSE Ethical Issues in Supervising Others  Can Their Misconduct B ETH4800CLE COURSE Ethical Issues in Supervising Others  Can Their Misconduct B ETH4800
CLE COURSE Ethical Issues in Supervising Others Can Their Misconduct B ETH4800
 
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docxPrepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
 
ETHICAL DECISIONSMOD 4Start by reading and following these ins.docx
ETHICAL DECISIONSMOD 4Start by reading and following these ins.docxETHICAL DECISIONSMOD 4Start by reading and following these ins.docx
ETHICAL DECISIONSMOD 4Start by reading and following these ins.docx
 
L1 Work Readiness & Employment Bk Ck
L1 Work Readiness & Employment Bk CkL1 Work Readiness & Employment Bk Ck
L1 Work Readiness & Employment Bk Ck
 

More from Dan Houser

Hacking Bourbon
Hacking BourbonHacking Bourbon
Hacking Bourbon
Dan Houser
 
Securing Big Data and the Grid
Securing Big Data and the GridSecuring Big Data and the Grid
Securing Big Data and the Grid
Dan Houser
 
RSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityRSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated Identity
Dan Houser
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
Dan Houser
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
Dan Houser
 
Risk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityRisk Based Planning for Mission Continuity
Risk Based Planning for Mission Continuity
Dan Houser
 
Security Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIISecurity Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIII
Dan Houser
 
Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security Professionals
Dan Houser
 
Advanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM AuditAdvanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM Audit
Dan Houser
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security myths
Dan Houser
 
Hacking a Major Security Conference
Hacking a Major Security ConferenceHacking a Major Security Conference
Hacking a Major Security Conference
Dan Houser
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
Dan Houser
 
Case Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataCase Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big Data
Dan Houser
 
Crypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT AuditorCrypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT Auditor
Dan Houser
 

More from Dan Houser (14)

Hacking Bourbon
Hacking BourbonHacking Bourbon
Hacking Bourbon
 
Securing Big Data and the Grid
Securing Big Data and the GridSecuring Big Data and the Grid
Securing Big Data and the Grid
 
RSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated IdentityRSA2008: What Vendors Won’t Tell You About Federated Identity
RSA2008: What Vendors Won’t Tell You About Federated Identity
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
Perimeter Defense in a World Without Walls
Perimeter Defense in a World Without WallsPerimeter Defense in a World Without Walls
Perimeter Defense in a World Without Walls
 
Risk Based Planning for Mission Continuity
Risk Based Planning for Mission ContinuityRisk Based Planning for Mission Continuity
Risk Based Planning for Mission Continuity
 
Security Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIIISecurity Capability Model - InfoSec Forum VIII
Security Capability Model - InfoSec Forum VIII
 
Certifications and Career Development for Security Professionals
Certifications and Career Development for Security ProfessionalsCertifications and Career Development for Security Professionals
Certifications and Career Development for Security Professionals
 
Advanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM AuditAdvanced IAM - Surviving the IAM Audit
Advanced IAM - Surviving the IAM Audit
 
Debunking Information Security myths
Debunking Information Security mythsDebunking Information Security myths
Debunking Information Security myths
 
Hacking a Major Security Conference
Hacking a Major Security ConferenceHacking a Major Security Conference
Hacking a Major Security Conference
 
Building & Running A Successful Identity Program
Building & Running A Successful Identity ProgramBuilding & Running A Successful Identity Program
Building & Running A Successful Identity Program
 
Case Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big DataCase Study: Securing & Tokenizing Big Data
Case Study: Securing & Tokenizing Big Data
 
Crypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT AuditorCrypto in the Real World: or How to Scare an IT Auditor
Crypto in the Real World: or How to Scare an IT Auditor
 

Recently uploaded

BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
cahgading001
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
Alliance Jobs
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
NWEXAM
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
MuhammadWaqasBaloch1
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
Base Camp
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
SocMediaFin - Joyce Sullivan
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Sreenivas702647
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
KateRobinson68
 

Recently uploaded (20)

BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
 

2013 (ISC)² Congress: This Curious Thing Called Ethics

  • 1. This Curious Thing Called Ethics William H. Murray CISSP Dan Houser CISSP-ISSAP Graham Jackson, JD Mano Paul CSSLP
  • 2. I am a Professional • Professional education. • Professional experience. • Professional work requiring special intellectual attainment and discipline. • Share a body of professional knowledge with my colleagues. • Subscribe to ethical principles, behave in an ethical way, and set a good example. • Responsibility to the common good, my clients, and my profession ahead of personal interests. • Sign my work and take responsibility for the work of my subordinates, colleagues, and associates.
  • 3. I am a Security Professional • Special authority, responsibilities, and duties • Must not give unwarranted comfort or to raise unnecessary alarm • Use privileges and capabilities as intended. • Professionals owe a duty of confidentiality • As a security professional, have a particular duty to preserve the confidentiality of my principals' data. I must not disclose it to others, including government authorities, without their permission.
  • 4. I am a CISSP • Subscribed to the Code of Ethics • Public good even ahead of those to my principals, those to my principals ahead of those to my colleagues, and all of those ahead of my own interests. • As a member of (ISC)² I can refer to the ethical guidance on our web site to help me determine the greater of goods or the lesser of evils. • If my principal fails to take my advice or engages in illegal activity, I must take a walk and maintain my silence. • When all else fails me, I can consult with other professionals.
  • 6. Your Responsibility • Subscribe to the Code • Familiarize yourself with the guidance • Resolve dilemmas (greater of goods, lesser of evils) • Consult with and support your colleagues • Professional Development • Review and endorse Applications • Report violations
  • 7. Case Study 1 Amanda, a CSSLP, files a compliant. Brian, a CISSP, is an independent consultant, and was retained to perform a network and system assessment to PCI-DSS standards. Amanda states that the work was slipshod and did not appropriately reflect the standards. Amanda asserts that the work did not demonstrate an ethical amount of due care.
  • 8. Case Study 1a Amanda provides further documents showing 3 signatures on compliance documents that she states were forged, and that the signatures do not match those of the principals. When contacted, Brian states that he received verbal permission to sign the documents on their behalf to meet an urgent filing deadline, so he forged the three signatures.
  • 9. Case Study 2 Cindy is a student in a CSSLP curriculum who is caught by campus security, having compromised the security of some of her school’s servers. The school states this was without notice or permission. Cindy states that she was conducting a pen test for a science fair project on network security. She has documents showing her plan, but no documents providing permission.
  • 10. Case Study 2a Cindy provides documentation from her teacher that they were to have arranged for a scope of effort document and permission letter from the school. Cindy started her scan as scheduled, but did not wait for the letter and permission.
  • 11. Case Study 3 Daryl is a CISSP who has self-published a general security book. Emily files a complaint, and shows that Daryl had copied 12 pages, verbatim, from a book she had published two years prior. Emily shows that the text contained no attribution.
  • 12. Case Study 3a Daryl responds to the allegations showing that the text had attribution as an endnote and was listed in the forward of the book and the bibliography.
  • 13. Case Study 4 Frank is a CISSP who has conducted a certification & accreditation assessment for a new system and documented 40 high risk issues in the certification report. After signoff on the certification report, one of certifiers modifies the document, moving most “high risk” issues to show them as “resolved”. It is the modified version which is used for accreditation signoff.
  • 14. Case Study 4a Frank takes the original and changed documents to the InfoSec VP, a CISSP, who does not want to “make waves”, and the issue goes unchallenged. Frank takes the issue to the Ethics & Compliance Hotline, and they decline to take up the case because it’s not concerning customer data. Frank has signed an NDA, and audit results are classified as Company Confidential.
  • 15. Bill Murray email Dan Houser dan.houser@isc2.org @SecWonk Graham Jackson gjackson@isc2.org Mano Paul email

Editor's Notes

  1. <number>
  2. <number>
  3. <number>