Chapter 5: Compliance: Law and Ethics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

Law

The system of rules recognized and enforced by a governing authority to regulate behavior and maintain order within society.

2
New cards

Ethics

The branch of philosophy that examines moral principles and what constitutes right and wrong conduct.

3
New cards

Difference between Law and Ethics

Laws carry government enforcement and penalties, while ethics rely on personal and societal values without legal enforcement.

4
New cards

Mores

Fixed moral attitudes or customs of a group that form the basis for ethical behavior in a society.

5
New cards

Cybersecurity Professional Ethics

The expectation that professionals act with integrity, maintain confidentiality, and uphold accountability due to their privileged access to sensitive information.

6
New cards

“Who will watch the watchmen?”

A reminder that cybersecurity professionals must maintain the highest ethical standards because they are trusted guardians of critical systems and data.

7
New cards

Ethics in Cybersecurity

The study and application of moral principles guiding the behavior of individuals responsible for protecting information and systems.

8
New cards

Normative Ethics

Studies what makes actions right or wrong; also known as moral theory.

9
New cards

Meta-Ethics

Examines the meaning of ethical judgments—what concepts like “good” or “right” truly mean.

10
New cards

Descriptive Ethics

Analyzes past ethical decisions and behaviors to understand what others have considered right.

11
New cards

Applied Ethics

Applies ethical theory to real-world scenarios and practical moral choices.

12
New cards

Deontological Ethics

Focuses on moral duty and intent rather than consequences—doing the right thing because it is right.

13
New cards

Utilitarian Approach

An action is ethical if it produces the greatest good or least harm for the greatest number of people.

14
New cards

Rights Approach

An action is ethical if it respects and protects the moral rights of all affected individuals.

15
New cards

Fairness/Justice Approach

Ethical actions treat everyone equally or based on fair, defendable standards.

16
New cards

Common-Good Approach

Focuses on actions that contribute to the welfare of the community and protect the vulnerable.

17
New cards

Virtue Approach

Ethical behavior reflects personal virtues such as honesty, integrity, courage, and compassion.

18
New cards

Ethics in Information Processing Professionals

IT professionals face added ethical duties due to access to sensitive data and control over automated systems that affect organizational conduct.

19
New cards

Slippery Slope Concept

The gradual justification of unethical actions based on small prior allowances; leads to moral compromise over time.

20
New cards

IBM and the Holocaust Example

A cautionary case showing how technology, when used unethically, can contribute to large-scale harm or injustice.

21
New cards

Ten Commandments of Computer Ethics

A list of ethical guidelines for computing professionals emphasizing respect, honesty, and responsibility in computer use.

22
New cards

Ethics and Education

Education is key in shaping ethical awareness and leveling ethical perceptions within organizations.

23
New cards

SETA Program (Security Education, Training, and Awareness)

Programs designed to prevent ignorance-based ethical or legal violations through consistent education and policy awareness.

24
New cards

Deterring Unethical Behavior

The use of policy, education, and technology controls to discourage unethical or illegal acts within organizations.

25
New cards

Three Causes of Unethical Behavior

Ignorance, Accidents, and Intent—each requiring specific prevention methods.

26
New cards

Three Conditions for Deterrence

Expectation of being caught, fear of penalty, and expectation that penalties will be applied.

27
New cards

Professional Organizations and Ethics

Groups that define codes of conduct for members to ensure professional and ethical behavior in cybersecurity fields.

28
New cards

ACM (Association for Computing Machinery)

Promotes ethical computing practices, confidentiality, privacy, and respect for intellectual property.

29
New cards

(ISC)² (International Information System Security Certification Consortium)

Publishes a four-canon code of ethics: protect society, act honorably, provide diligent service, and advance the profession.

30
New cards

SANS/GIAC

Code of ethics promoting respect for the public, employer, certification, and self; emphasizes responsibility and honesty.

31
New cards

ISACA

Focuses on auditing, control, and cybersecurity; requires professionalism, objectivity, privacy protection, and ongoing education.

32
New cards

ISSA (Information Systems Security Association)

Encourages ethical conduct in promoting security best practices and protecting the confidentiality, integrity, and availability of information.

33
New cards

Cybersecurity and Law

Cybersecurity professionals must understand and comply with legal frameworks when managing sensitive information such as PII and PHI.

34
New cards

Types of Law

Categories include Constitutional, Statutory, Regulatory, and Common Law—each derived from different branches of government.

35
New cards

Civil Law

Regulates relationships between individuals or organizations; includes torts, contracts, and family law.

36
New cards

Criminal Law

Addresses offenses against society; prosecuted by the state.

37
New cards

Private Law

Regulates relationships between individuals and organizations, including commercial and labor law.

38
New cards

Public Law

Governs the actions of government agencies and their interactions with citizens.

39
New cards

Computer Fraud and Abuse Act (CFAA)

Criminalizes unauthorized access to protected computers and information systems.

40
New cards

Computer Security Act (CSA) of 1987

Requires federal agencies to implement cybersecurity standards, training, and awareness.

41
New cards

HIPAA (Health Insurance Portability and Accountability Act)

Protects patient medical data and sets national standards for privacy and security of health information.

42
New cards

HITECH Act

Expands HIPAA by strengthening breach notification requirements and enforcement for electronic health information.

43
New cards

Gramm-Leach-Bliley Act (GLBA)

Requires financial institutions to disclose and protect customers’ personal financial information.

44
New cards

Sarbanes-Oxley Act (SOX)

Enforces corporate accountability by requiring accurate financial reporting and secure information systems.

45
New cards

Freedom of Information Act (FOIA)

Allows public access to federal government records with limited exemptions.

46
New cards

Economic Espionage Act

Protects trade secrets and punishes theft of proprietary business information.

47
New cards

Security and Freedom Through Encryption Act (SAFE)

Protects the right to use encryption and prohibits government key registration requirements.

48
New cards

Digital Millennium Copyright Act (DMCA)

Prohibits removal of copyright protections and sets penalties for digital piracy.

49
New cards

Privacy Act of 1974

Regulates how federal agencies collect and disclose personal information.

50
New cards

Children’s Online Privacy Protection Act (COPPA)

Requires parental consent before collecting data from children under 13 online.

51
New cards

Federal Information Security Management Act (FISMA)

Requires federal agencies to implement comprehensive cybersecurity programs.

52
New cards

PCI DSS (Payment Card Industry Data Security Standard)

Industry standard for protecting credit and debit card data; defines 12 security requirements across six key areas.

53
New cards

Policy vs. Law

Policies govern internal organizational behavior; laws govern society. Ignorance of law is no excuse, but ignorance of policy is a valid defense if not properly communicated.

54
New cards

Requirements for Effective Policy

Policies must be distributed, read, understood, acknowledged, and uniformly enforced to be legally defensible.

55
New cards

Organizational Liability

An organization may be legally responsible for employee misconduct; liability increases when due care and due diligence are neglected.

56
New cards

Due Care

Ensuring employees are aware of acceptable behavior and organizational policies.

57
New cards

Due Diligence

Taking ongoing, reasonable steps to comply with laws and protect others.

58
New cards

Jurisdiction

The legal authority of a court to hear a case; may extend globally through long-arm jurisdiction.

59
New cards

InfraGard

A public-private partnership between the FBI and private sector to share cybersecurity threat intelligence and protect critical infrastructure.

60
New cards

DHS (Department of Homeland Security)

Nation’s leading agency for coordinating protection of physical and digital infrastructure through its directorates.

61
New cards

NSA (National Security Agency)

Handles national cryptology, cybersecurity research, and information assurance for U.S. intelligence and defense.

62
New cards

NSA Centers of Academic Excellence (CAE)

Programs recognizing universities excelling in cybersecurity education, research, and operations.

63
New cards

U.S. Secret Service

Investigates computer fraud, identity theft, and electronic financial crimes; originally created to protect U.S. currency.

64
New cards

READY.gov

Citizen cybersecurity preparedness initiative promoting public awareness and response planning for cyber incidents.

65
New cards

European Council Cybercrime Convention (2001)

International treaty standardizing laws to combat global cybercrime.

66
New cards

GDPR (General Data Protection Regulation)

EU law governing data privacy and transfer; applies to organizations handling EU citizens’ data.

67
New cards

Australian High-Tech Crime Laws

Define offenses such as hacking, data destruction, denial-of-service, and malware creation under the Criminal Code Act 1995.

68
New cards

State-Level Cybersecurity Laws

Individual states regulate data privacy, disposal, and breach notification; e.g., Georgia Computer Systems Protection Act and Georgia Identity Theft Law.

69
New cards

Standards vs. Laws

Standards guide best practices (e.g., PCI DSS), while laws mandate compliance and impose penalties.

70
New cards

Deterrence

The prevention of unethical or illegal actions by creating an expectation of being caught, fear of penalty, and assurance penalties will be enforced.

71
New cards

Long-Arm Jurisdiction

Allows courts to assert authority beyond normal boundaries when an out-of-state or foreign entity causes local harm.

72
New cards

Due Care vs. Due Diligence

Due care is awareness and policy enforcement; due diligence is proactive risk management and compliance efforts.

73
New cards

Ethical Decision Making

Applying moral frameworks to resolve dilemmas, balancing duty, fairness, consequences, and integrity.

74
New cards

Cybersecurity Professional Responsibility

Professionals must protect systems, respect privacy, and act with accountability and honesty in all operations.

75
New cards