SlideShare a Scribd company logo
ISE 542: IT Security
Chapter – 10
Ethics in IT Security
Outline
 Law and Ethics in Information Security
 Codes of Ethics and Professional Organizations
Introduction
 To minimize liabilities/reduce risks, the
information security practitioner must:
 Understand current legal environment
 Stay current with laws and regulations
 Watch for new issues that emerge
Law and Ethics in Information
Security
 Laws: rules that mandate or prohibit certain
societal behavior
 Ethics: define socially acceptable behavior
 Laws carry sanctions of a governing authority;
ethics do not
What is Computer Ethics?
computer ethics is the analysis of the
nature and social impact of computer
technology and the corresponding
formulation and justification of policies
for the ethical use of such technology
It is a study, an analysis of the values of
human actions influenced by computer
technology.
Why study computer and
information ethics
 Apply ethical point of view to real-world
computing context
 Identify and solve ethical problems in
specific fields of computing
Why study computer and
information ethics
doing so will make us behave like responsible
professionals
doing so will teach us how to avoid computer
abuse and catastrophes
the advance of computing technology will
continue to create temporary policy vacuums
the use of computing permanently transforms
certain ethical issues to the degree that their
alterations require independent study
the use of computing technology creates, and
will continue to create, novel ethical issues that
require special study.
Anatomy of the Problem
Recent terrorist attacks and the raise
in cyber attacks have raised concern
about the security of information,
security of individuals, and a need to
protect the nation’s cyber infrastructure
US Patriot Act of 2001 defined critical
infrastructure as those "systems and
assets, whether physical or virtual, so
vital to the United States that the
incapacity or destruction of such systems
and assets would have a debilitating
impact on security, national economic
security, national public health or
safety, or any combination of those
matters."
Ethics in IT Security
What are the causes?
 Revenge
 Joke
 The Hacker's Ethics
• All information should be free
 Terrorism
 Political and Military Espionage
 Business (Competition) Espionage
 Hate (national origin, gender, and race)
 Personal gain/Fame/Fun
 Ignorance
Social and Ethical Consequences
 Psychological effects – these include hate and
joke especially on an individual.
 may lead to individual reclusion,
 increasing isolation
 Moral decay – There is a moral imperative in all
our actions. When human actions, whether bad or
good, become so frequent, they create a level of
familiarity that leads to acceptance as “normal”.
This type of acceptance of actions formerly
viewed as immoral and bad by society lead to
moral decay.
Social and Ethical Consequences
 Loss of privacy – After an attack, there is usually
an over reaction and a resurgence in the need for
quick solutions to the problem that seems to have
hit home. Many businesses are responding with
patches, filters, ID tools, and a whole list of
“solutions”.
 Trust – Along with privacy lost, is trust lost.
Individuals once attacked, lose trust in a person,
group, company or anything else believed to be the
source of the attack or believed to be unable to
stop the attack.
Relevant U.S. Laws (General)
 Computer Fraud and Abuse Act of 1986
(CFA Act)
 National Information Infrastructure
Protection Act of 1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and
Competition Act
of 1996
 Computer Security Act of 1987
Privacy
 One of the hottest topics in information
security
 Privacy of Customer Information Section of
common carrier regulation
 Federal Privacy Act of 1974
 Electronic Communications Privacy Act of 1986
 Health Insurance Portability and Accountability
Act of 1996 (HIPAA), aka Kennedy-Kassebaum
Act
 Financial Services Modernization Act, or
Gramm-Leach-Bliley Act of 1999
Export and Espionage Laws
 Economic Espionage Act of 1996 (EEA)
 attempts to prevent trade secrets from being
illegally shared.
 Security And Freedom Through Encryption
Act of 1999 (SAFE)
 to provide guidance on the use of encryption,
and provided measures of public protection
from government intervention.
U.S. Copyright Law
 Intellectual property recognized as
protected asset in the U.S.; copyright law
extends to electronic formats
 With proper acknowledgement, permissible
to include portions of others’ work as
reference
 U.S. Copyright Office Web site:
www.copyright.gov
International Laws and Legal Bodies
 European Council Cyber-Crime Convention:
 Establishes international task force overseeing
Internet security functions for standardized
international technology laws
 Attempts to improve effectiveness of
international investigations into breaches of
technology law
 Well received by intellectual property rights
advocates due to emphasis on copyright
infringement prosecution
 Lacks realistic provisions for enforcement
Digital Millennium Copyright Act
(DMCA)
 U.S. contribution to international effort to
reduce impact of copyright, trademark, and
privacy infringement
 A response to European Union Directive
95/46/EC, which adds protection to
individuals with regard to processing and
free movement of personal data
United Nations Charter
 Makes provisions, to a degree, for
information security during information
warfare (IW)
 IW involves use of information technology
to conduct organized and lawful military
operations
 IW is relatively new type of warfare,
although military has been conducting
electronic warfare operations for decades
Ethics and Information Security
Ethics and Education
 Overriding factor in leveling ethical
perceptions within a small population is
education
 Employees must be trained in expected
behaviors of an ethical employee, especially
in areas of information security
 Proper ethical training vital to creating
informed, well prepared, and low-risk system
user
Codes of Ethics and Professional
Organizations
 Several professional organizations have
established codes of conduct/ethics
 Codes of ethics can have positive effect;
unfortunately, many employers do not
encourage joining of these professional
organizations
 Responsibility of security professionals to
act ethically and according to policies of
employer, professional organization, and laws
of society
Association of Computing Machinery
(ACM)
 ACM established in 1947 as “the world's
first educational and scientific computing
society”
 Code of ethics contains references to
protecting information confidentiality,
causing no harm, protecting others’ privacy,
and respecting others’ intellectual property
International Information
Systems Security Certification
Consortium, Inc. (ISC)2
 Non-profit organization focusing on
development and implementation of
information security certifications and
credentials
 Code primarily designed for information
security professionals who have certification
from (ISC)2
System Administration, Networking,
and Security Institute (SANS)
 Professional organization with a large
membership dedicated to protection of
information and systems
 SANS offers set of certifications called
Global Information Assurance Certification
(GIAC)
Information Systems Audit and
Control Association (ISACA)
 Professional association with focus on
auditing, control, and security
 Concentrates on providing IT control
practices and standards
 ISACA has code of ethics for its
professionals
Computer Security Institute (CSI)
 Provides information and training to
support computer, networking, and
information security professionals
 Though without a code of ethics, has
argued for adoption of ethical behavior
among information security professionals
Information Systems Security
Association (ISSA)
 Nonprofit society of information security
(IS) professionals
 Primary mission to bring together qualified
IS practitioners for information exchange
and educational development
 Promotes code of ethics similar to (ISC)2
,
ISACA and ACM
Other Security Organizations
 Internet Society (ISOC): promotes
development and implementation of
education, standards, policy and education to
promote the Internet
 Computer Security Division (CSD): division
of National Institute for Standards and
Technology (NIST); promotes industry best
practices and is important reference for
information security professionals
Other Security Organizations
(continued)
 CERT (Computer Emergency Response Team)
Coordination Center (CERT/CC): center of
Internet security expertise operated by
Carnegie Mellon University
Key U.S. Federal Agencies
 Department of Homeland Security (DHS)
 Federal Bureau of Investigation’s National
Infrastructure Protection Center (NIPC)
 National Security Agency (NSA)
 U.S. Secret Service

More Related Content

PPTX
Introduction to Cyber Crime
PPTX
Cyber crime
PPSX
Security policies
PPTX
Cyber Security in Society
PPTX
Cyber Crime
PPTX
Cyber Crime PPT
PPT
Information security
PDF
Chapter 11 laws and ethic information security
Introduction to Cyber Crime
Cyber crime
Security policies
Cyber Security in Society
Cyber Crime
Cyber Crime PPT
Information security
Chapter 11 laws and ethic information security

What's hot (20)

PPTX
Cyber crime and security
PPTX
cyber security presentation.pptx
PPTX
Data Security - English
PDF
Cybersecurity Employee Training
PPTX
Ethics in-information-security
PPTX
Computer security
PPTX
Cyber Security Best Practices
PPT
Cyber Crime and Security
PPTX
Introduction to information security
PPTX
Hacking & its types
PPTX
Cyber Crime
PDF
1. introduction to cyber security
PPTX
Introduction to cyber security
PPTX
Social engineering
PPT
Introduction To Information Security
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPT
Chapter 5
PDF
Overview on data privacy
PPTX
Cyber security
Cyber crime and security
cyber security presentation.pptx
Data Security - English
Cybersecurity Employee Training
Ethics in-information-security
Computer security
Cyber Security Best Practices
Cyber Crime and Security
Introduction to information security
Hacking & its types
Cyber Crime
1. introduction to cyber security
Introduction to cyber security
Social engineering
Introduction To Information Security
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Chapter 5
Overview on data privacy
Cyber security
Ad

Viewers also liked (14)

PPT
Information ethics
PPTX
Digital Law Powerpoint
PPTX
Digital law powerpoint
PPTX
Unauthorized access and use
PPT
Illegal downloading
PDF
Ethics for IT Professionals
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
PPTX
Chapter 4 Computer Ethics and Security
PPTX
3.2.1 The Internet
PPTX
Ethics in Information Technology
PPT
The 10 Commandments of Computer Ethics
PPTX
Ethical hacking presentation
PPTX
Hacking ppt
PPTX
Cyber crime and security ppt
Information ethics
Digital Law Powerpoint
Digital law powerpoint
Unauthorized access and use
Illegal downloading
Ethics for IT Professionals
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Ethics and Security
3.2.1 The Internet
Ethics in Information Technology
The 10 Commandments of Computer Ethics
Ethical hacking presentation
Hacking ppt
Cyber crime and security ppt
Ad

Similar to Ethics in IT Security (20)

PPTX
02 Legal, Ethical, and Professional Issues in Information Security
PPTX
Legal, Ethical, and Professional Issues In Information Security
PPT
Legal, Ethical and professional issues in Information Security
PDF
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
PDF
Lecture 8.pdf
PPT
Introduction in Computer Science Ethics
PPT
3999779.ppt
PDF
STUCOR_CS8792-LL.pdf
PDF
Cisco cybersecurity essentials chapter 8
PPT
lesson333.ppt
PPTX
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
PDF
Chapter 1 - Introduction.pdf
PPTX
CSE_Instructor_Materials22222222222222_Chapter8.pptx
DOCX
Review questions
DOCX
1.3. Legal Ethical Professional Aspects of security .docx
PPT
Stallings ch18 privacy
DOCX
chapter 3 AIS by james hall summarize in book
PPTX
Introduction to Hacking (101) Fundamentals
PPT
Presentation on Law and Ethics in Information Security.ppt
PPTX
Cyber Crime with basics and knowledge to cyber sphere
02 Legal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical and professional issues in Information Security
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
Lecture 8.pdf
Introduction in Computer Science Ethics
3999779.ppt
STUCOR_CS8792-LL.pdf
Cisco cybersecurity essentials chapter 8
lesson333.ppt
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Chapter 1 - Introduction.pdf
CSE_Instructor_Materials22222222222222_Chapter8.pptx
Review questions
1.3. Legal Ethical Professional Aspects of security .docx
Stallings ch18 privacy
chapter 3 AIS by james hall summarize in book
Introduction to Hacking (101) Fundamentals
Presentation on Law and Ethics in Information Security.ppt
Cyber Crime with basics and knowledge to cyber sphere

Recently uploaded (20)

PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
“Google Algorithm Updates in 2025 Guide”
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
DOCX
Unit-3 cyber security network security of internet system
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
The Internet -By the Numbers, Sri Lanka Edition
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
Job_Card_System_Styled_lorem_ipsum_.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
“Google Algorithm Updates in 2025 Guide”
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introuction about WHO-FIC in ICD-10.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Unit-3 cyber security network security of internet system
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
INTERNET------BASICS-------UPDATED PPT PRESENTATION
RPKI Status Update, presented by Makito Lay at IDNOG 10
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
The Internet -By the Numbers, Sri Lanka Edition

Ethics in IT Security

  • 1. ISE 542: IT Security Chapter – 10 Ethics in IT Security
  • 2. Outline  Law and Ethics in Information Security  Codes of Ethics and Professional Organizations
  • 3. Introduction  To minimize liabilities/reduce risks, the information security practitioner must:  Understand current legal environment  Stay current with laws and regulations  Watch for new issues that emerge
  • 4. Law and Ethics in Information Security  Laws: rules that mandate or prohibit certain societal behavior  Ethics: define socially acceptable behavior  Laws carry sanctions of a governing authority; ethics do not
  • 5. What is Computer Ethics? computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology It is a study, an analysis of the values of human actions influenced by computer technology.
  • 6. Why study computer and information ethics  Apply ethical point of view to real-world computing context  Identify and solve ethical problems in specific fields of computing
  • 7. Why study computer and information ethics doing so will make us behave like responsible professionals doing so will teach us how to avoid computer abuse and catastrophes the advance of computing technology will continue to create temporary policy vacuums the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study the use of computing technology creates, and will continue to create, novel ethical issues that require special study.
  • 8. Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the security of information, security of individuals, and a need to protect the nation’s cyber infrastructure US Patriot Act of 2001 defined critical infrastructure as those "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters."
  • 10. What are the causes?  Revenge  Joke  The Hacker's Ethics • All information should be free  Terrorism  Political and Military Espionage  Business (Competition) Espionage  Hate (national origin, gender, and race)  Personal gain/Fame/Fun  Ignorance
  • 11. Social and Ethical Consequences  Psychological effects – these include hate and joke especially on an individual.  may lead to individual reclusion,  increasing isolation  Moral decay – There is a moral imperative in all our actions. When human actions, whether bad or good, become so frequent, they create a level of familiarity that leads to acceptance as “normal”. This type of acceptance of actions formerly viewed as immoral and bad by society lead to moral decay.
  • 12. Social and Ethical Consequences  Loss of privacy – After an attack, there is usually an over reaction and a resurgence in the need for quick solutions to the problem that seems to have hit home. Many businesses are responding with patches, filters, ID tools, and a whole list of “solutions”.  Trust – Along with privacy lost, is trust lost. Individuals once attacked, lose trust in a person, group, company or anything else believed to be the source of the attack or believed to be unable to stop the attack.
  • 13. Relevant U.S. Laws (General)  Computer Fraud and Abuse Act of 1986 (CFA Act)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Computer Security Act of 1987
  • 14. Privacy  One of the hottest topics in information security  Privacy of Customer Information Section of common carrier regulation  Federal Privacy Act of 1974  Electronic Communications Privacy Act of 1986  Health Insurance Portability and Accountability Act of 1996 (HIPAA), aka Kennedy-Kassebaum Act  Financial Services Modernization Act, or Gramm-Leach-Bliley Act of 1999
  • 15. Export and Espionage Laws  Economic Espionage Act of 1996 (EEA)  attempts to prevent trade secrets from being illegally shared.  Security And Freedom Through Encryption Act of 1999 (SAFE)  to provide guidance on the use of encryption, and provided measures of public protection from government intervention.
  • 16. U.S. Copyright Law  Intellectual property recognized as protected asset in the U.S.; copyright law extends to electronic formats  With proper acknowledgement, permissible to include portions of others’ work as reference  U.S. Copyright Office Web site: www.copyright.gov
  • 17. International Laws and Legal Bodies  European Council Cyber-Crime Convention:  Establishes international task force overseeing Internet security functions for standardized international technology laws  Attempts to improve effectiveness of international investigations into breaches of technology law  Well received by intellectual property rights advocates due to emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement
  • 18. Digital Millennium Copyright Act (DMCA)  U.S. contribution to international effort to reduce impact of copyright, trademark, and privacy infringement  A response to European Union Directive 95/46/EC, which adds protection to individuals with regard to processing and free movement of personal data
  • 19. United Nations Charter  Makes provisions, to a degree, for information security during information warfare (IW)  IW involves use of information technology to conduct organized and lawful military operations  IW is relatively new type of warfare, although military has been conducting electronic warfare operations for decades
  • 21. Ethics and Education  Overriding factor in leveling ethical perceptions within a small population is education  Employees must be trained in expected behaviors of an ethical employee, especially in areas of information security  Proper ethical training vital to creating informed, well prepared, and low-risk system user
  • 22. Codes of Ethics and Professional Organizations  Several professional organizations have established codes of conduct/ethics  Codes of ethics can have positive effect; unfortunately, many employers do not encourage joining of these professional organizations  Responsibility of security professionals to act ethically and according to policies of employer, professional organization, and laws of society
  • 23. Association of Computing Machinery (ACM)  ACM established in 1947 as “the world's first educational and scientific computing society”  Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others’ privacy, and respecting others’ intellectual property
  • 24. International Information Systems Security Certification Consortium, Inc. (ISC)2  Non-profit organization focusing on development and implementation of information security certifications and credentials  Code primarily designed for information security professionals who have certification from (ISC)2
  • 25. System Administration, Networking, and Security Institute (SANS)  Professional organization with a large membership dedicated to protection of information and systems  SANS offers set of certifications called Global Information Assurance Certification (GIAC)
  • 26. Information Systems Audit and Control Association (ISACA)  Professional association with focus on auditing, control, and security  Concentrates on providing IT control practices and standards  ISACA has code of ethics for its professionals
  • 27. Computer Security Institute (CSI)  Provides information and training to support computer, networking, and information security professionals  Though without a code of ethics, has argued for adoption of ethical behavior among information security professionals
  • 28. Information Systems Security Association (ISSA)  Nonprofit society of information security (IS) professionals  Primary mission to bring together qualified IS practitioners for information exchange and educational development  Promotes code of ethics similar to (ISC)2 , ISACA and ACM
  • 29. Other Security Organizations  Internet Society (ISOC): promotes development and implementation of education, standards, policy and education to promote the Internet  Computer Security Division (CSD): division of National Institute for Standards and Technology (NIST); promotes industry best practices and is important reference for information security professionals
  • 30. Other Security Organizations (continued)  CERT (Computer Emergency Response Team) Coordination Center (CERT/CC): center of Internet security expertise operated by Carnegie Mellon University
  • 31. Key U.S. Federal Agencies  Department of Homeland Security (DHS)  Federal Bureau of Investigation’s National Infrastructure Protection Center (NIPC)  National Security Agency (NSA)  U.S. Secret Service