Ethics of Security Policy
Privacy and Confidentiality
To provide the highest level of privacy possible for users of its information technology systems and to assure their rightsof free speech and intellectual freedom are protected and uninhibited.
Protection of Information
The level of security practices required for various information types depends on who has created the information, whois maintaining the information, the nature of the information itself, and whether there are specific laws or requirementsor guidelines associated with the use and distribution of the information.
An Organization has many types of official information including staff records, financial records, personnel records, andother business records.
Individual information includes academic, research, personal and business correspondence, and other records createdand managed by individualstaff. As creators and managers of this information, individuals are responsible for securingand protecting their information.
Users are responsible for the security of computer systems passwords, personal account passwords (e.g. Net-IDpasswords) and personal identification numbers (PINs) and will be held accountable for anyactivities linked to theiraccounts. Users must follow established university standards for maintaining and managing passwords.
Security for IT Systems
Computer systems can become transmitters of viruses, denial of service attacks, open file exchange services, and othermalicious electronic activities. To prevent these malicious activities, individuals are required to be aware of and complywith policies relating to the use of these applications.
Reporting Security Breaches
Effective security practice includes the prompt and appropriate response to breaches in security. It is a duty upon allindividuals to report incidents in which they believe computer or network security is at risk.
In a route cipher, the plaintext is first written out ina grid of given dimensions, thenread off in a pattern given in the key. For example, using the same plaintext that weused for rail fence:W R I O R F E O EE E S V E L A N JA D C E D E T C X
The key might specify "spiral inwards, clockwise, starting from the top right". That would give a cipher text of:
Route ciphers have many more keys than a rail fence. In fact, for messages of reasonable length, the number of possiblekeys is potentially too great to be enumerated even by modern machinery. However, not all keys are equally good. Badlychosen routes will leave excessive chunks of plaintext, or text simply reversed, and this will give cryptanalysts a clue asto the routes.