Documente Academic
Documente Profesional
Documente Cultură
1. Many organizations have code of conducts or code of ethics to ensure the operation
of business run smoothly and fair treatments are provide to all the staff working in the
organization. Generally, organizations design their computer system security code of
ethics based on Computer Security Ethics Institute. List all the ten commandments of
the Computer Security Ethics Institute.
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people's computer work.
Thou shalt not snoop around in other people's computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you have not paid (without
permission).
Thou shalt not use other people's computer resources without authorization or proper
compensation.
Thou shalt not appropriate other people's intellectual output.
Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.
2. There are organizations that establish codes of conduct or ethics to protect the
information confidentiality, privacy and intellectual property which, based on some of
following non-profit organizations. Provide the function of each organization, which
listed below:
System Administration, Networking, and Security Institute (SANS)
1
physical security, from the level of system administrator to the chief information
security officer.
The Cyber Security Division is a division of the Science and Technology Directorate of
the United States Department of Homeland Security.
a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.
3. A program with a benign capability that conceals another, sinister purpose is called a
a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.
a. on a hard disk.
2
b. on a thumb drive.
c. on a CD-ROM.
d. in an email attachment.
e. All of the above
a. John Barlow.
b. Katie Hafner.
c. John Markoff.
d. Robert Morris, Jr.
e. Bruce Sterling.
a. bot.
b. spoof.
c. vampire.
d. virus.
e. worm.
a. diving.
b. hacking.
c. phreaking.
d. social engineering.
e. trashing.
Social engineering, in the context of information security, refers to psychological manipulation of
people into performing actions or divulging confidential information.
a. a bombing run.
b. a curtain closer.
c. a denial-of-service attack.
d. an electronic overdose.
e. phreaking.
10. Anonymous is
a. an activist group that promotes the interests of the Recording Industry Association of
America.
3
b. a loosely organized group of hacktivists that claimed responsibility for a DDoS attack
on Church of Scientology Web sites.
c. the name given to the People’s Liberation Army group that was responsible for more
than 100 intrusions around the world.
d. the name of the group that launched the Stuxnet worm.
e. All of the above except c.
Fill in blanks: