You are on page 1of 2

Larayos,Khent Harold M

1.

The term CISSP stands for Certified Information Systems Security


Professional. The ethical rules that CISSP holders have agreed to follow are
the following: · First: Protect society, the common good, necessary public
trust and confidence, and the infrastructure.

First: Protect society, the common good, necessary public trust and
confidence, and the infrastructure.
·         Second: Act honorably, honestly, justly, responsibly, and legally.
·         Third: Provide diligent and competent service to principles.
·         Fourth: Advance and protect the profession.

2.

The NASA OCIO Cybersecurity & Privacy Division (CSPD) manages the Agency-wide
information and cybersecurity program to correct known vulnerabilities, reduce barriers to cross-
Center collaboration, and provide cost-effective cybersecurity services in support of NASA’s
information systems and e-Gov initiatives. The CSPD ensures that cybersecurity across NASA
meets confidentiality, integrity, and availability objectives for data and information systems, to
include disaster recovery and continuity of operations for systems, in order to support the
business continuity requirements of critical Agency programs and processes. The CSPD
develops and maintains a cybersecurity program that ensures consistent security policy, identifies
and implements risk-based security controls, and tracks security metrics to gauge compliance
and effectiveness.

3.

Republic Act No. 10175 or the Cybercrime Prevention Act of 2012 created the Office of Cybercrime (OOC)
within the DOJ and designated it as the Central Authority in all matters relating to international mutual
assistance and extradition for cybercrime and cyber-related matters.

It also acts as the focal agency in formulating and implementing law enforcement investigation and
prosecution strategies in curbing cybercrime and cyber-related offenses nationwide.

4.

it was twitter

Late in 2019, Twitter CEO Jack Dorsey floated "Project Blue Sky," a plan for
an interoperable, federated, standardized Twitter that would let users (or
toolsmiths who work on behalf of users) gain more control over their
participation in the Twitter system. This was an exciting moment for us, a
significant lurch

towards an interoperable , decentralized social media world. We were


especially excited to see Dorsey cite Mike Masnick's excellent Protocols, Not
Products paper. It’s been more than a year,...

5.

a)      The scientist’s failure to acknowledge the computer programmer was in


my opinion a lack of good character. The scientist should have not takin full
credit for work the computer programmer helped him do.
b)      The programmer’s decision not to point out the design flaw was a poor
decision on her part. She could have done better considering her skills and
input.
c)      The student’s action in searching for the loophole was good because he was
then able to tell the administrator about it. If someone with really bad
intention had found out before it was fixed, a lot of people could have been
victim of identity theft. The student’s action in continuing to access other’s
records for two weeks was highly unethical. The system administrator’s
failure to correct the problem sooner was a big problem considering the size
of a school, you need people with high skill to protect this data.
d)      The customer’s decision to keep the word-processing program was unethical.
e)      The programmer’s modification of the accounting system was a problem
because she is trusted to have access to this kind of things but expected to act
ethically upon it and this is not what she did in this situation.
f)       The programmer’s weekend use of the company computer was not a problem
since there was proof of it, if anything happened it could have been traced
back to him.
g)      The student’s use of company computer was not a problem because if it was
during her break she was not expected to be working so there is no problem in
what she was doing.

You might also like