Professional Documents
Culture Documents
1
PrE 5: Information Security and Management
The following are operational security The Ten Commandments of Computer Ethics
controls:
1. Thou shalt not use a computer to harm
Personnel security other people.
Physical and
2. Thou shalt not interfere with other
Contingency planning
people’s computer work.
Awareness and training
3. Thou shalt not snoop around in other
people’s computer files.
3. Technical Security Controls
4. Thou shalt not use a computer to steal.
Technical controls focus on security controls
5. Thou shalt not use a computer to bear
that the computer system executes. The
false witness.
controls can provide automated protection for
unauthorized access or misuse, facilitate 6. Thou shalt not copy or use proprietary
detection of security violations, and support software for which you have not paid.
security requirements for applications and
7. Thou shalt not use other people’s
data. Technical controls use software and data
computer resources without authorization or
to monitor and control access to information
proper compensation.
and computing system.
8. Thou shalt not appropriate other people’s
The following are technical security controls:
intellectual output.
Encryption
9. Thou shalt think about the social
Antivirus And Anti-Malware Software
consequences of the program you are writing
Firewalls
or the system you are designing.