Quote by Immanuel Kant: "In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so."
Differentiate between law and ethics.
Describe the ethical foundations and approaches underlying modern codes of ethics.
Discuss relevant professional security organizations' roles and relationships to organizational InfoSec.
Explain the importance of ethical codes of conduct for InfoSec professionals and their organizations.
Identify significant national and international laws related to InfoSec practices.
Explain challenges and methods associated with managing digital forensics in organizations.
Ethics: The branch of philosophy governing moral judgment.
Examines nature, source, and validity of moral judgments.
Deterrence: Preventing unwanted actions by threatening punishment.
Computer Fraud and Abuse (CFA) Act: Core federal law for computer-related offenses.
Computer Security Act (CSA): Legislation to improve federal information systems' security.
Electronic Communications Privacy Act (ECPA) of 1986: Regulates interception of communications.
Health Insurance Portability and Accountability Act (HIPAA): Protects healthcare data privacy and security.
Privacy Act of 1974: Regulates government's use of personal information.
Due Care: Ensures employees understand acceptable conduct.
Due Diligence: Steps taken to comply with laws/regulations.
Jurisdiction: Legal authority to make decisions.
Liability: Legal obligations of an entity.
Digital Forensics: Investigations of computer media for evidence.
InfoSec professionals manage critical information and must uphold high ethical standards.
Quotes Juvenal: "Quis custodiet ipsos custodies?" regarding the oversight of ethical behavior.
It's not standard to hire directly into InfoSec positions without prior experience.
Normative Ethics: What makes actions right or wrong?
Meta-Ethics: Meaning of ethical judgments.
Descriptive Ethics: Study of past ethical choices.
Applied Ethics: Applying ethical codes practically.
Deontological Ethics: Focuses on intentions and duties over consequences.
Utilitarian Approach: Actions resulting in the greatest good.
Rights Approach: Protects moral rights of individuals.
Justice Approach: Equitable treatment for all.
Common Good Approach: Emphasizes community benefits.
Virtue Approach: Actions should reflect ideal virtues such as integrity and fairness.
Do not harm others with computers.
Do not interfere with others' computer work.
Do not snoop in others' files.
Do not steal or misrepresent proprietary software.
Consider the social implications of your programming and systems design.
Key findings show education is vital in aligning ethical perceptions in a workforce.
Training necessary for expected ethical behaviors in employees.
InfoSec personnel should implement policies and training to deter unethical acts.
Categories of Unethical Behavior:
Ignorance
Accident
Intent
Deterrence: Effective when there is fear of penalty, high probability of being caught, and administration of penalties.
Association of Computing Machinery (ACM): Promotes education, ethical responsibilities in computing.
ISC²: Focus on societal protection, competency, and legal compliance.
SANS: Ethics emphasize respect for the public and self.
ISACA: Focuses on ethical performance standards and confidentiality.
ISSA: Promotes practices that ensure information resource security.
Organizations can be financially liable for employees' unethical actions.
Compliance with due care and due diligence is critical.
FBI: InfraGard program promotes education and resilience in InfoSec.
NSA: Protects U.S. information systems; oversees signal intelligence.
U.S. Secret Service: Handles computer fraud and identity crime offenses.
Department of Homeland Security: Manages cybersecurity and information sharing.
Organizations must appoint investigators for policy violations.
Forensic methods must be documented and systematic.
Digital Forensics includes preservation, documentation, and interpretation of evidence.
Establish procedures for investigations, including authorization, evidence collection, and reporting frameworks.
Introduction
Law and ethics in InfoSec
Legal environment specifics
Ethical concepts in relation to InfoSec
Professional organizations’ ethical codes
Organizational liability considerations
Overview of key federal agencies in InfoSec
Managing investigations within organizations.