Anuhya Ai week 7 - Copy
docx
keyboard_arrow_up
School
Griffith University *
*We aren’t endorsed by this school
Course
3208AFE
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by CheiFNaviGator
Question Number 1:
The (ISC)2, formally known as the International Information System Security Certification
Consortium, offers a diverse range of cybersecurity certifications. One of its flagship
certifications is CISSP, an acronym for Certified Information Systems Security Professional.
CISSP certification is highly esteemed in the cybersecurity community due to its rigorous
standards and comprehensive coverage of information security topics. To retain their CISSP
designation and remain in good standing, certified professionals are required to actively
engage in continuous education. This commitment to ongoing learning is essential in the fast-
paced field of cybersecurity, as it ensures that CISSP holders remain well-informed about the
latest threats, technologies, and best practices.
This not only benefits the professionals themselves but also the organizations they serve, as it
guarantees that they are protected by experts who are up to date with the latest security trends
and innovations. For example, if we consider the evolving landscape of cloud security, CISSP
holders need to constantly update their knowledge regarding cloud security best practices, the
latest threats in the cloud, and the regulatory compliance requirements related to cloud
environments. By staying informed about these critical areas, they can effectively secure their
organization's data and systems in an increasingly cloud-centric world.
Question Number 2:
In the state of Florida, several laws have been enacted to prosecute computer-related and
cybersecurity-related crimes. Two noteworthy laws are the Florida Computer Crime Act
(FCCA) and the Florida Information Protection Act (FIPA).
The Florida Computer Crime Act is designed to address various computer-related crimes,
including hacking, identity theft, and unauthorized access to computer systems. Under this
law, individuals found guilty of such crimes can face penalties that range from fines to
imprisonment, depending on the severity of the offense. For example, hacking into a
government computer system with the intent to disrupt services could lead to a prison
sentence of up to 5 years, while unauthorized access to a private corporation's database might
result in a fine of up to $10,000.
The Florida Information Protection Act, on the other hand, primarily deals with data breaches
and the protection of personal information. Companies and entities that suffer data breaches
are required to notify affected individuals and relevant authorities. Failure to do so can result
in significant fines. For instance, if a company fails to notify individuals affected by a data
breach, they may be fined up to $500,000.
Question Number 3:
Scenario 1:
The scientist's failure to acknowledge the computer programmer's contribution is
unethical. It's essential to give credit where it's due, fostering a fair and respectful work
environment.
Scenario 2:
The programmer's decision not to point out design flaws is unethical as she
withheld valuable information, potentially compromising the system's effectiveness and the
owner's business.
Scenario 3:
The student's action in searching for the vulnerability is ethical, but continuing to
access records was unethical. The system administrator's delay in correction was also
unethical, jeopardizing data security and integrity.
Scenario 4:
The user's decision to keep the word-processing program is ethical, as it was a
vendor's mistake, but they should inform the vendor to rectify the situation.
Scenario 5:
The programmer's modification of the accounting system is unethical as it was
for personal gain, which breaches trust and ethical conduct in a professional setting.
Scenario 6:
The programmer's use of the company computer is unethical, and selling apps
developed on company time is very unethical, potentially leading to job loss and legal
repercussions.
Scenario 7:
Using the company computer during breaks is neither ethical nor unethical, but
doing so during company time is unethical, as it could affect productivity and work ethics.
Scenario 8:
Copying the software was unethical, regardless of the intention to destroy it later.
If there was no intent to destroy, it becomes very unethical, potentially leading to legal
consequences and academic misconduct.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help