100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

C841 Legal Issues in Information Security Task 2. MOST RECENT WITH 100% COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
04-10-2023
Written in
2023/2024

C841 Legal Issues in Information Security Task 2. MOST RECENT WITH 100% COMPLETE SOLUTIONS

Institution
C841 Legal Issues In Information Security Task 2
Course
C841 Legal Issues in Information Security Task 2

Content preview

C841 Legal Issues in Information Security Task 2 Page 1




C841 Legal Issues in Information Security Task 2


 A1: Discussion of Ethical Guidelines or Standards: In regards to the TechFite case study,

there are a number of relevant information security moral principles. First, all sensitive or

proprietary information encountered on the job should be treated with respect and kept

private. Second, professional responsibilities are to be discharged with integrity and

diligence in accordance with all applicable laws. In addition, the professional reputations of

coworkers, employers, and customers should not be intentionally slandered or brought into

question. Moreover, all work should be conducted in a manner consistent with information

security best practices. Finally, employees should not engage in any activities that may

constitute a conflict of interest.

 A1a: Justification of Standards or Guidelines: All of these tenets can be found in the

ethics policies of prominent organizations throughout the IT community. For example,

the Information Systems Security Association International (ISSA) Code of Ethics

echoes the sentiment that data privacy must be maintained (ISSA Code of Ethics, 2016).

It also emphasizes the importance of industry best practices and prohibits relationships

that could be construed as a conflict of interest (ISSA Code of Ethics, 2016). The

International Information Systems Security Certification Consortium (ISC)² addresses

professional responsibilities, stating that individuals should “act honorably, honestly,

justly, responsibly, and legally” ((ISC)² Code of Ethics, 1996). The American Society

for Industrial Security (ASIS) speaks to the issue of professional reputations, declaring

that personnel must not “maliciously injure the professional reputation or practice of

colleagues, clients, or employees” (ASIS Certification Code of Professional

, C841 Legal Issues in Information Security Task 2 Page 2


Responsibility, 2018).

 A2: Description of Unethical Behaviors: There were a number of individuals and groups

within TechFite whose behavior was unethical. The head of the Applications Division, Carl

Jaspers, failed to safeguard sensitive data, encouraged immoral surveillance techniques and

had a relationship with IT Security Analyst Nadia Johnson that represented a clear conflict

of interest. This relationship was a quid pro quo arrangement where Mr. Jaspers gave Ms.

Johnson gifts and positive reviews in exchange for not reporting the division’s violations

(Jackson, n.d., p. 2). Nadia Johnson accepted these bribes and subsequently produced false

reports that claimed there was no unusual activity within the division (Jackson, n.d., p. 2).

The Business Intelligence (BI) Unit within the Applications Division accessed other

divisions without authorization, viewed private information without permission, mishandled

customer data and performed penetration tests without obtaining consent (Jackson, n.d., p.

3). Specifically, BI Unit employees Sarah Miller, Jack Hudson, and Megan Rogers

performed vulnerability scans of rival company’s networks. In addition, Mr. Hudson

“coordinates efforts by third parties to gather intelligence through surveilling and through

mining companies’ trash” (Jackson, n.d., p. 3). Furthermore, the Marketing/Sales Unit did

not perform proper separation of duties and the Financial Unit neglected to audit their

payment records.

 A3: Factors: The most obvious issue is the lack of an established Code of Ethics at

TechFite. Employers often make the mistake of assuming their staff understand what

conduct is considered acceptable and will abide by these precepts without instruction. While

in a perfect world this would be true, in reality this is not the case. A formal policy must be

in place that describes what ethical guidelines employees are expected to follow, and what

Written for

Institution
C841 Legal Issues in Information Security Task 2
Course
C841 Legal Issues in Information Security Task 2

Document information

Uploaded on
October 4, 2023
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • c841
  • legal issues
  • security tasks

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
studypartner1 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
432
Member since
2 year
Number of followers
212
Documents
1992
Last sold
5 days ago

4.2

67 reviews

5
37
4
14
3
9
2
4
1
3

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions