SlideShare a Scribd company logo
1 of 24
Principles of Information Security, 2nd Edition 2
Introduction
 You must understand scope of an organization’s legal and
ethical responsibilities
 To minimize liabilities/reduce risks, the information
security practitioner must:
 Understand current legal environment
 Stay current with laws and regulations
 Watch for new issues that emerge
Principles of Information Security, 2nd Edition 3
Law and Ethics in Information Security
 Laws: rules that mandate or prohibit certain societal
behavior
 Ethics: define socially acceptable behavior
 Cultural mores: fixed moral attitudes or customs of a
particular group; ethics based on these
 Laws carry sanctions of a governing authority; ethics do not
Organizational Liability and need of Council
 Liability:
Legal obligation of an entity that extends beyond
criminal or contract law.
 Includes obligation to make restitution, or compensate
for, wrongs committed by an organization or its
employees.
4
Organizational Liability and need of Council
 Due care**
 Must ensure that every employee knows
 what is acceptable or unacceptable behavior ,consequences of illegal or
unethical actions.
 Due diligence**
 Requires the organization to make a valid effort to protect others continually
maintain this level of effort.
 Jurisdiction**
 A court's right to hear a case if a wrong was committed in its territory, or
involves its citizenry
 Long arm jurisdiction**
 To draw an accused individual into its court systems from around the world
or across the country.
5
Principles of Information Security, 2nd Edition 6
Types of Law
 Civil
 Criminal
 Private
 Public
Principles of Information Security, 2nd Edition 7
Relevant U.S. Laws (General)
 Computer Fraud and Abuse Act of 1986 (CFAAct)
 National Information Infrastructure Protection Act of 1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and Competition Act
of 1996
 Communications Decency Act of 1996 (CDA)
 Computer Security Act of 1987
Principles of Information Security, 2nd Edition 8
Privacy
 One of the hottest topics in information security
 Is a “state of being free from unsanctioned intrusion”
 Ability to aggregate data from multiple sources allows
creation of information databases previously unheard of
Principles of Information Security, 2nd Edition 9
Export and Espionage Laws
 Economic Espionage Act of 1996 (EEA)
 Security And Freedom Through Encryption Act of 1999
(SAFE)
Principles of Information Security, 2nd Edition 10
U.S. Copyright Law
 Intellectual property is recognized as a protected asset in
the U.S.; copyright law extends to electronic formats.
 With proper acknowledgment, permissible to include
portions of others’ work as a reference.
 As long as proper acknowledgment is provided to the
original author, it is entirely permissible.
Principles of Information Security, 2nd Edition 11
Freedom of Information Act of 1966 (FOIA)
 Allows access to federal agency records or information
not determined to be matter of national security
 U.S. government agencies required to disclose any
requested information upon receipt of written request
 Some information protected from disclosure
Principles of Information Security, 2nd Edition 12
State and Local Regulations
 Restrictions on organizational computer technology use
exist at international, national, state, local levels
 Information security professional responsible for
understanding state regulations and ensuring
organization is compliant with regulations
Principles of Information Security, 2nd Edition 13
International Laws and Legal Bodies
 European Council Cyber-Crime Convention:
 Establishes international task force overseeing Internet
security functions for standardized international
technology laws
 Attempts to improve effectiveness of international
investigations into breaches of technology law
 Well received by intellectual property rights advocates due
to emphasis on copyright infringement prosecution
 Lacks realistic provisions for enforcement
14
International Laws and Legal Bodies
 Few international laws relating to privacy and information
security.
 European Council Cyber-Crime Convention
 2001. Creates an international task force
 Improve the effectiveness of international investigations
 Emphasis on copyright infringement prosecution
 Lacks realistic provisions for enforcement
 WTO Agreement on Intellectual Property Rights
 Intellectual property rules for the multilateral trade systems.
 Digital Millennium Copyright Act**
 U.S. contribution to international effort to reduce impact of
copyright, trademark, and privacy infringement .
15
Policy Versus Law
 Most organizations develop and formalize a body of
expectations called policy
 Policies serve as organizational laws
 To be enforceable, policy:
 Disseminate.
 Reviewed.
 Comprehend.
 Compliance.
Principles of Information Security, 2nd Edition 16
Ethics and Information Security
“thou Shalt” is known for “you shall”
Principles of Information Security, 2nd Edition 17
Ethical Differences Across Cultures
 Cultural differences create difficulty in determining what is
and is not ethical
 Difficulties arise when one nationality’s ethical behavior
conflicts with ethics of another national group
 Example: many of ways in which Asian cultures use
computer technology is software piracy
Principles of Information Security, 2nd Edition 18
Ethics and Education
 Overriding factor in leveling ethical perceptions within a
small population is education
 Employees must be trained in expected behaviors of an
ethical employee, especially in areas of information
security
 Proper ethical training vital to creating informed, well
prepared, and low-risk system user
Principles of Information Security, 2nd Edition 19
Deterrence (‫تھام‬ ‫)روک‬ to Unethical and Illegal
Behavior
 Deterrence: best method for preventing an illegal or
unethical activity; e.g., laws, policies, technical controls
 Laws and policies only deter if three conditions are
present:
 Fear of penalty
 Probability of being caught
 Probability of penalty being administered
Principles of Information Security, 2nd Edition 20
Codes of Ethics and Professional Organizations
 Several professional organizations have established
codes of conduct/ethics
 Codes of ethics can have positive effect; unfortunately,
many employers do not encourage joining of these
professional organizations
 Responsibility of security professionals to act ethically
and according to policies of employer, professional
organization, and laws of society
Major IT Professional Organizations and Ethics
 Association for Computing Machinery (ACM)
 promotes education and provides discounts for students
 educational and scientific computing society
 International Information Systems Security Certification Consortium (ISC2)
 develops and implements information security certifications and
credentials
 System Administration, Networking, and Security Institute (SANS)
 Global Information Assurance Certifications (GIAC)
 Information Systems Audit and Control Association (ISACA)
 focus on auditing, control and security
 Computer Security Institute (CSI)
 sponsors education and training for information security
 Information Systems Security Association (ISSA)
 information exchange and educational development for information
security practitioners
21
Principles of Information Security, 2nd Edition 22
Key U.S. Federal Agencies
 Department of Homeland Security (DHS)
 Federal Bureau of Investigation’s National Infrastructure
Protection Center (NIPC)
 National Security Agency (NSA)
 U.S. Secret Service
Principles of Information Security, 2nd Edition 23
Organizational Liability(‫داری‬ ‫)ذمہ‬ and the
Need for Counsel
 Liability is legal obligation of an entity; includes legal
obligation to make restitution for wrongs committed
 Organization increases liability if it refuses to take
measures known as due care
 Due diligence requires that an organization make valid
effort to protect others and continually maintain that level
of effort
Principles of Information Security, 2nd Edition 24
Summary
 Many organizations have codes of conduct and/or codes
of ethics
 Organization increases liability if it refuses to take
measures known as due care
 Due diligence requires that organization make valid effort
to protect others and continually maintain that effort

More Related Content

What's hot

The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptShruthi48
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 

What's hot (20)

The need for security
The need for securityThe need for security
The need for security
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Network Security
Network SecurityNetwork Security
Network Security
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Network security
Network securityNetwork security
Network security
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Network security
 Network security Network security
Network security
 

Similar to Legal, Ethical and professional issues in Information Security

ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfssuserceaa40
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 

Similar to Legal, Ethical and professional issues in Information Security (20)

ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Chapter3.ppt
Chapter3.pptChapter3.ppt
Chapter3.ppt
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Review questions
Review questionsReview questions
Review questions
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 

Recently uploaded

Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 

Recently uploaded (20)

Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 

Legal, Ethical and professional issues in Information Security

  • 1.
  • 2. Principles of Information Security, 2nd Edition 2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To minimize liabilities/reduce risks, the information security practitioner must:  Understand current legal environment  Stay current with laws and regulations  Watch for new issues that emerge
  • 3. Principles of Information Security, 2nd Edition 3 Law and Ethics in Information Security  Laws: rules that mandate or prohibit certain societal behavior  Ethics: define socially acceptable behavior  Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these  Laws carry sanctions of a governing authority; ethics do not
  • 4. Organizational Liability and need of Council  Liability: Legal obligation of an entity that extends beyond criminal or contract law.  Includes obligation to make restitution, or compensate for, wrongs committed by an organization or its employees. 4
  • 5. Organizational Liability and need of Council  Due care**  Must ensure that every employee knows  what is acceptable or unacceptable behavior ,consequences of illegal or unethical actions.  Due diligence**  Requires the organization to make a valid effort to protect others continually maintain this level of effort.  Jurisdiction**  A court's right to hear a case if a wrong was committed in its territory, or involves its citizenry  Long arm jurisdiction**  To draw an accused individual into its court systems from around the world or across the country. 5
  • 6. Principles of Information Security, 2nd Edition 6 Types of Law  Civil  Criminal  Private  Public
  • 7. Principles of Information Security, 2nd Edition 7 Relevant U.S. Laws (General)  Computer Fraud and Abuse Act of 1986 (CFAAct)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Communications Decency Act of 1996 (CDA)  Computer Security Act of 1987
  • 8. Principles of Information Security, 2nd Edition 8 Privacy  One of the hottest topics in information security  Is a “state of being free from unsanctioned intrusion”  Ability to aggregate data from multiple sources allows creation of information databases previously unheard of
  • 9. Principles of Information Security, 2nd Edition 9 Export and Espionage Laws  Economic Espionage Act of 1996 (EEA)  Security And Freedom Through Encryption Act of 1999 (SAFE)
  • 10. Principles of Information Security, 2nd Edition 10 U.S. Copyright Law  Intellectual property is recognized as a protected asset in the U.S.; copyright law extends to electronic formats.  With proper acknowledgment, permissible to include portions of others’ work as a reference.  As long as proper acknowledgment is provided to the original author, it is entirely permissible.
  • 11. Principles of Information Security, 2nd Edition 11 Freedom of Information Act of 1966 (FOIA)  Allows access to federal agency records or information not determined to be matter of national security  U.S. government agencies required to disclose any requested information upon receipt of written request  Some information protected from disclosure
  • 12. Principles of Information Security, 2nd Edition 12 State and Local Regulations  Restrictions on organizational computer technology use exist at international, national, state, local levels  Information security professional responsible for understanding state regulations and ensuring organization is compliant with regulations
  • 13. Principles of Information Security, 2nd Edition 13 International Laws and Legal Bodies  European Council Cyber-Crime Convention:  Establishes international task force overseeing Internet security functions for standardized international technology laws  Attempts to improve effectiveness of international investigations into breaches of technology law  Well received by intellectual property rights advocates due to emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement
  • 14. 14 International Laws and Legal Bodies  Few international laws relating to privacy and information security.  European Council Cyber-Crime Convention  2001. Creates an international task force  Improve the effectiveness of international investigations  Emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement  WTO Agreement on Intellectual Property Rights  Intellectual property rules for the multilateral trade systems.  Digital Millennium Copyright Act**  U.S. contribution to international effort to reduce impact of copyright, trademark, and privacy infringement .
  • 15. 15 Policy Versus Law  Most organizations develop and formalize a body of expectations called policy  Policies serve as organizational laws  To be enforceable, policy:  Disseminate.  Reviewed.  Comprehend.  Compliance.
  • 16. Principles of Information Security, 2nd Edition 16 Ethics and Information Security “thou Shalt” is known for “you shall”
  • 17. Principles of Information Security, 2nd Edition 17 Ethical Differences Across Cultures  Cultural differences create difficulty in determining what is and is not ethical  Difficulties arise when one nationality’s ethical behavior conflicts with ethics of another national group  Example: many of ways in which Asian cultures use computer technology is software piracy
  • 18. Principles of Information Security, 2nd Edition 18 Ethics and Education  Overriding factor in leveling ethical perceptions within a small population is education  Employees must be trained in expected behaviors of an ethical employee, especially in areas of information security  Proper ethical training vital to creating informed, well prepared, and low-risk system user
  • 19. Principles of Information Security, 2nd Edition 19 Deterrence (‫تھام‬ ‫)روک‬ to Unethical and Illegal Behavior  Deterrence: best method for preventing an illegal or unethical activity; e.g., laws, policies, technical controls  Laws and policies only deter if three conditions are present:  Fear of penalty  Probability of being caught  Probability of penalty being administered
  • 20. Principles of Information Security, 2nd Edition 20 Codes of Ethics and Professional Organizations  Several professional organizations have established codes of conduct/ethics  Codes of ethics can have positive effect; unfortunately, many employers do not encourage joining of these professional organizations  Responsibility of security professionals to act ethically and according to policies of employer, professional organization, and laws of society
  • 21. Major IT Professional Organizations and Ethics  Association for Computing Machinery (ACM)  promotes education and provides discounts for students  educational and scientific computing society  International Information Systems Security Certification Consortium (ISC2)  develops and implements information security certifications and credentials  System Administration, Networking, and Security Institute (SANS)  Global Information Assurance Certifications (GIAC)  Information Systems Audit and Control Association (ISACA)  focus on auditing, control and security  Computer Security Institute (CSI)  sponsors education and training for information security  Information Systems Security Association (ISSA)  information exchange and educational development for information security practitioners 21
  • 22. Principles of Information Security, 2nd Edition 22 Key U.S. Federal Agencies  Department of Homeland Security (DHS)  Federal Bureau of Investigation’s National Infrastructure Protection Center (NIPC)  National Security Agency (NSA)  U.S. Secret Service
  • 23. Principles of Information Security, 2nd Edition 23 Organizational Liability(‫داری‬ ‫)ذمہ‬ and the Need for Counsel  Liability is legal obligation of an entity; includes legal obligation to make restitution for wrongs committed  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that an organization make valid effort to protect others and continually maintain that level of effort
  • 24. Principles of Information Security, 2nd Edition 24 Summary  Many organizations have codes of conduct and/or codes of ethics  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that organization make valid effort to protect others and continually maintain that effort