Packet 5 Lecture - Organizations Providing Resources For Professionals
Packet 5 Lecture - Organizations Providing Resources For Professionals
LEARN
Learning Packet 1
ING
PACKE Organizations Providing Resources for Professionals
1.1 Introduction
Because of the eclectic nature of information assurance, you must have some
basic structure to guide you. The first step in this process is to define certification and
professionalism. They are quickly becoming recognized as critical factors in the success
of a corporation as well as a government agency.
Indeed, information assurance and security are often cited as core competencies
in industry and government redesign. Prahalad and Hamel referred to corporate core
competencies as the roots of competitiveness.
Professional certification is a procedure to identify individuals who have a
common education and experience, who demonstrate some quantifiable level of
knowledge and skills, and who subscribe to a code of professional ethics.
As organizations become more reliant on information systems, information
assurance professionals are challenged to put forth formidable efforts to secure
information systems against myriad threats. A security professional should be
equipped with knowledge in all areas of information assurance and should observe the
highest code of professional ethics to assist an organization in protecting information.
Organizations and institutions exist to train and equip security professionals by
providing information, security-related information, guidelines, best practices,
frameworks, and certification. This chapter presents the background and functions of
some of these organizations. In addition, the chapter explores the codes of ethics
promoted by organizations for security professionals.
1.2 Topics/Discussion
SANS Institute
The SysAdmin, Audit, Network and Security (SANS) Institute was
established as a privately held training organization involved in cooperative
research in 1989. The organization conducts certifications in specialized areas
such as forensic analysis, incident handling, and security audits along with the
Global Information Assurance Certificate (GIAC). The institute is involved in
delivering and maintaining one of the largest collections of research documents
on information security. The SANS Institute provides various free resources on
information security–related news, vulnerabilities, alerts, and warnings. There
are various tracks and certification programs provided by SANS Institute. They
are recommended for highly technical professionals who deal with
implementing and operating technology.
Codes of Ethics
Different individuals may have different perceptions of ethics. You may have
heard of the term ethical hacker.
What makes the action of a hacker legitimate and ethical? The action
would be legitimate and ethical if consent of the owner is obtained prior to
performing an assessment of system security. The consent necessary for ethical
hacking is simply the application of one code of ethics among those found in
professional security organizations.
Even if an action is not ethical, it may still be legal. Organizations should
develop guidelines on computer or business ethics and disseminate this
information to their employees through awareness or training sessions.
These ethical guidelines show stakeholders and employees that
management is sincere in developing and supporting an ethical environment
within the organization. This will limit the occurrence of unethical conduct
within the organization eventually.
Certifying organizations may require their certified security professionals
to comply fully with their code of ethics. By reference to these guidelines,
organizations and the information assurance community can establish ethical
guidelines to conform to local custom and in accordance with national laws and
regulations in this area.
Table 5-1 summarizes the codes of ethics from organizations such as
(ISC)2, SANS Institute, ISACA, ISSA, BCI, and Computer Ethics Institute (CEI).
5
LEARN
Learning Packet 1
ING
PACKE
1.3 References
Information Assurance Handbook (DR. Corey Schou & Steven Hernandez)
1.4 Acknowledgment
The images, tables, figures and information contained in this module were taken
from the references cited above.