Professional Documents
Culture Documents
Lesson 2
Lesson 2
1
PrE 5: Information Security and Management
The following are operational security The Ten Commandments of Computer Ethics
controls:
1. Thou shalt not use a computer to harm
• Personnel security other people.
• Physical and
2. Thou shalt not interfere with other people’s
• Contingency planning
computer work.
• Awareness and training
3. Thou shalt not snoop around in other
people’s computer files.
3. Technical Security Controls
4. Thou shalt not use a computer to steal.
Technical controls focus on security controls
5. Thou shalt not use a computer to bear false
that the computer system executes. The
witness.
controls can provide automated protection for
unauthorized access or misuse, facilitate 6. Thou shalt not copy or use proprietary
detection of security violations, and support software for which you have not paid.
security requirements for applications and
7. Thou shalt not use other people’s computer
data. Technical controls use software and data
resources without authorization or proper
to monitor and control access to information
compensation.
and computing system.
8. Thou shalt not appropriate other people’s
The following are technical security controls:
intellectual output.
• Encryption
9. Thou shalt think about the social
• Antivirus And Anti-Malware Software
consequences of the program you are writing
• Firewalls or the system you are designing.