Anuhya Ai week 7 - Copy

docx

School

Griffith University *

*We aren’t endorsed by this school

Course

3208AFE

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by CheiFNaviGator

Report
Question Number 1: The (ISC)2, formally known as the International Information System Security Certification Consortium, offers a diverse range of cybersecurity certifications. One of its flagship certifications is CISSP, an acronym for Certified Information Systems Security Professional. CISSP certification is highly esteemed in the cybersecurity community due to its rigorous standards and comprehensive coverage of information security topics. To retain their CISSP designation and remain in good standing, certified professionals are required to actively engage in continuous education. This commitment to ongoing learning is essential in the fast- paced field of cybersecurity, as it ensures that CISSP holders remain well-informed about the latest threats, technologies, and best practices. This not only benefits the professionals themselves but also the organizations they serve, as it guarantees that they are protected by experts who are up to date with the latest security trends and innovations. For example, if we consider the evolving landscape of cloud security, CISSP holders need to constantly update their knowledge regarding cloud security best practices, the latest threats in the cloud, and the regulatory compliance requirements related to cloud environments. By staying informed about these critical areas, they can effectively secure their organization's data and systems in an increasingly cloud-centric world. Question Number 2: In the state of Florida, several laws have been enacted to prosecute computer-related and cybersecurity-related crimes. Two noteworthy laws are the Florida Computer Crime Act (FCCA) and the Florida Information Protection Act (FIPA). The Florida Computer Crime Act is designed to address various computer-related crimes, including hacking, identity theft, and unauthorized access to computer systems. Under this law, individuals found guilty of such crimes can face penalties that range from fines to imprisonment, depending on the severity of the offense. For example, hacking into a government computer system with the intent to disrupt services could lead to a prison sentence of up to 5 years, while unauthorized access to a private corporation's database might result in a fine of up to $10,000. The Florida Information Protection Act, on the other hand, primarily deals with data breaches and the protection of personal information. Companies and entities that suffer data breaches are required to notify affected individuals and relevant authorities. Failure to do so can result in significant fines. For instance, if a company fails to notify individuals affected by a data breach, they may be fined up to $500,000. Question Number 3: Scenario 1: The scientist's failure to acknowledge the computer programmer's contribution is unethical. It's essential to give credit where it's due, fostering a fair and respectful work environment.
Scenario 2: The programmer's decision not to point out design flaws is unethical as she withheld valuable information, potentially compromising the system's effectiveness and the owner's business. Scenario 3: The student's action in searching for the vulnerability is ethical, but continuing to access records was unethical. The system administrator's delay in correction was also unethical, jeopardizing data security and integrity. Scenario 4: The user's decision to keep the word-processing program is ethical, as it was a vendor's mistake, but they should inform the vendor to rectify the situation. Scenario 5: The programmer's modification of the accounting system is unethical as it was for personal gain, which breaches trust and ethical conduct in a professional setting. Scenario 6: The programmer's use of the company computer is unethical, and selling apps developed on company time is very unethical, potentially leading to job loss and legal repercussions. Scenario 7: Using the company computer during breaks is neither ethical nor unethical, but doing so during company time is unethical, as it could affect productivity and work ethics. Scenario 8: Copying the software was unethical, regardless of the intention to destroy it later. If there was no intent to destroy, it becomes very unethical, potentially leading to legal consequences and academic misconduct.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help