zoukankan      html  css  js  c++  java
  • Security and Risk Management(5)

    Ethics:

    ISC Code of Ethics

    • You agree to this before the exam, and the code of ethics is very testable.
    • There are only four mandatory canons in the code. By necessity, such high-level guidance is not intended to be a substitute for the ethical judgment of the professional.

    Code of Ethics Preamble:

    • The safety and welfare of society and the common good, the duty to our principles, and to each other, require that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
    • Therefore, strict adherence to this code is a condition of certification.

    Code of Ethics Canons:

    • Protect society, the common good, necessary public trust and confidence, and the infrastructure.
    • Act honorably, honestly, justly, responsibly, and legally.
    • Provide diligent and competent service to principles.
    • Advance and protect the profession.

    Computer Ethics Institute

    • Ten Commandments of Computer Ethics:
      • Thou shalt not use a computer to harm other people.
      • Thou shalt not interfere with other people's computer work.
      • Thou shalt not snoop around in other people's computer files.
      • Thou shalt not use a computer to steal.
      • Thou shalt not use a computer to bear false witness.
      • Thou shalt not use copy or use proprietary software for which you have not paid.
      • Thou shalt not use other people's computer resources without authorization or proper compensation.
      • Thou shalt not appropriate other peoples' intellectual output.
      • Thou shalt think about the social consequences of the program you are writing or the system you are designing.
      • Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

     IAB's Ethics and the Internet

    • Defined as a Request For Comment(RFC), #1087 - Published in 1987
    • Considered unethical behavior:
      • Seeks to gain unauthorized access to the resources of the Internet.
      • Disrupts the intended use of the Internet.
      • Wastes resources(people, capacity, computer) through such actions:
        • Destroys the integrity of computer-based information.
        • Compromises the privacy of users.

    Internal Code of Ethics of your organization

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    代码中一些常见的小片段
    Surface Pro 3 扩展坞体验
    Microsoft SQL Server 存储过程举例
    Google Guava学习笔记——基础工具类针对Object类的使用
    Google Guava学习笔记——基础工具类Preconditions类的使用
    Google Guava学习笔记——基础工具类String处理类的使用
    Google Guava学习笔记——基础工具类Splitter的使用
    Google Guava学习笔记——基础工具类Joiner的使用
    Google Guava学习笔记——简介
    好书推荐——《Soft Skill》
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/12623444.html
Copyright © 2011-2022 走看看