William Slater's CIS 537 Blog

William Slater's CIS 537 Blog
CIS 537 - Introduction to Cyber Ethics

Sunday, January 1, 2012

Post 036 - CIS 537






NDAA Signed into Law


Without a lot of fanfare, while President Obama vacationed in Hawaii with his family, yesterday, December 31, 2011, he paused to take time to sign the National Defense Authorization Act into law. (NDAA (HR 1540)).


To understand how this federal law will affect the future of all Americans and our freedoms, please read this article that was written and published by a Canadian legal scholar, Michele Chossudovsky today, January 1, 2012.




THE INAUGURATION OF POLICE STATE USA 2012. Obama Signs the “National Defense Authorization Act ".  http://www.globalresearch.ca/index.php?context=va&aid=28441#  




If all these observations are true and we are now living in a new America where this law, the NDAA, supersedes our freedoms guaranteed in the U.S. Constitution, I am very sad and upset about it and I will leave it at that.









References:




Ballard, Spahr, Andrews, Ingersoll, LLC. (2004) Privacy Law. [Electronic version.] Retrieved from the web on May 14, 2004 at http://www.virtualchase.com/resources/privacy.html.

Chossudovsky, M. (2012). THE INAUGURATION OF POLICE STATE USA 2012. Obama Signs the “National Defense Authorization Act ".  An article published on January 1, 2012 at Globalresearch.ca.  Retrieved from the web at http://www.globalresearch.ca/index.php?context=va&aid=28441# on January 1, 2012.

Department of Homeland Security. (2009).  (U//FOUO) Rightwing Extremism:  Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment.   Retrieved from the web at  http://www.fas.org/irp/eprint/rightwing.pdf    on December 24, 2011.

Department of Justice (2004).  USA PATRIOT Act at Work.  Retrieved from the web at

Doyle, C. (2002).  USA PATRIOT Act: A sketch.  Retrieved from the web at http://www.fas.org/irp/crs/RS21203.pdf  on December 24, 2011.

Doyle, C. (2010).  National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments - a CRS Report Dated December 27, 2010.  Retrieved from the web at  http://www.fas.org/sgp/crs/intel/RS22406.pdf  on December 24, 2011.

Electronic Privacy and Information Center Resources about the USA PATRIOT Act http://epic.org/privacy/terrorism/usapatriot/ .

EPIC. (2011). Information Related to the USA PATRIOT Act. Retreived from the web at http://epic.org/privacy/terrorism/usapatriot/  on December 9, 2011.

Legal Information Institute. (2004). Right of Privacy, An Overview. An article from Cornell Law School. [Electronic version.] Retrieved from the web on May 14, 2004 at http://www.law.cornell.edu/topics/privacy.html .

Reynolds, G. W. (2012). Ethics in Information Tehnology, 4th edition. Boston, MA: Course Technology.

Riggs, M. (2011).  Lee County Deputies Tied Suspect to a Chair, Gagged Him, and Pepper-Sprayed Him to Death.  An article published at Reason.com on December 23, 2011. Retrieved from the web at http://reason.com/blog/2011/12/23/lee-county-deputies-tied-suspect-to-a-ch on December  23, 2011.

The White House. (2009). Cyberspace Policy Review. A document published by the Obama Administration. Retrieved from the web at http://info.publicintelligence.net/cyberspace_policy_review_final.pdf  on December 9, 2011.

ThinkExist.com. (2011).  Benjamin Franklin Quotes.  Retrieved from the web at http://thinkexist.com/quotation/those_who_desire_to_give_up_freedom_in_order_to/12888.html  on December 30, 2011.

U.S. Congress. (1987). The Computer Security Act of 1987. 101 STAT. 1724, Public Law 100-235, 100th Congress. Retrieved from the web http://www.nist.gov/cfo/legislation/Public%20Law%20100-235.pdf on December 9, 2011.

U.S. Government. (2009). American Recovery and Reinvestment Act of 2009. 101 STAT. 1724, Public Law 100-235, 100th Congress. Retrieved from the web http://www.opencongress.org/bill/111-s1/show on December 9, 2011.

U.S. Government.  (2001).  USA PATRIOT Act.  Retrieved from the web at  http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf   on December 24, 2011.


U.S. Government.  (2011).  National Defense Authorization Act.  Retrieved from the web at   http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540rh/pdf/BILLS-112hr1540rh.pdf   on January 2, 2012.

U.S. Government. (1776). The Declaration of Independence. Retrieved from the web at http://www.billslater.com/tj1776.htm  on November 6, 2011.

U.S. Government. (1791). U.S. Constitution. Retrieved from the web at
  
Wikipedia. (2011). USA PATRIOT Act. A Wikipedia article retrieved from the web at


= = = = = = = = = = = = = = = = = = = = = = =
William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
Chicago, IL
United States of America

 M.S. in Cybersecurity Program at Bellevue University
 CIS 537 Introduction to Cyber Ethics
 CIS 608 Information Security Management
 CYBR 515 - Security Architecture and Design
 CYBR 510 Physical, Operations, and Personnel Security
 Mastering Security
Career
Certifications
Credentials
ISO 27001






Friday, December 30, 2011

Post 035 - CIS 537




Sun Tzu and Cyber War


Sun Tzu and Cyber War, is an excellent 23-page paper by Kenneth Geers and it compares what is known today about the nature of cyberwarfare with ideas from the classic, most famous book ever written about war, the Art of War, by Sun Tzu (Geers, 2011).  Find it here: http://www.ccdcoe.org/articles/2011/Geers_SunTzuandCyberWar.pdf


Because the idea of cyberwarfare is rapidly evolving, Geers believes that the students of cyberwarfare and cybersecurity would do well do understand the basic foundations of warfare as laid out by Sun Tzu 2500 years ago in his book, the Art of War (Geers, 2011). 


Geers has been studying and writing about cyberwarfare for years.  In 2009, he co-wrote and published, The Virtual Battlefield: Perspectives on Cyber Warfare.  (Czosseck and Geers, 2009)


A full version of The Art of War can be retrieved at this link:  http://www.iluminaci.pl/info/sztuka-wojny-sun-tzu (Illuminati, 2012).




References


Czosseck, C. and Geers, K. (2009).  The Virtual Battlefield: Perspectives on Cyber Warfare.  IOS Press.


Illuminati - Freemasonry - YEAR 2012. (2012).  Sun Tzu's Art of War.  Retrieved from the web at 
http://www.iluminaci.pl/info/sztuka-wojny-sun-tzu on December 30, 2011.


Geers, K. (2011). Sun Tzu and Cyber War.  A professional technical paper published on February 9, 2011 at the Cooperative Cyber Defence Center of Excellence in Tallin, Estonia. Retrieved from the web at http://www.ccdcoe.org/articles/2011/Geers_SunTzuandCyberWar.pdf on December 25, 2011.







= = = = = = = = = = = = = = = = = = = = = = =

William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager
Chicago, IL
United States of America

M.S. in Cybersecurity Program at Bellevue University

CIS 537 Introduction to Cyber Ethics

CIS 608 Information Security Management

CYBR 515 - Security Architecture and Design

CYBR 510 Physical, Operations, and Personnel Security

CYBR 610 Risk Management Studies

CYBR 520 Human Aspects of Cybersecurity

CIS 607 Computer Forensics

CYBR 615 Cybersecurity Governance and Compliance

CYBR 625 Business Continuity Planning and Recovery

DET 630 Cyber Warfare & Deterrence

CYBR 525 Ethical Hacking and Response

CYBR 650 Current Trends in Cybersecurity

Mastering Security

Career

Certifications

Credentials

ISO 27001



Post 034 - CIS 537









 Week Five Assignments
Week 5 - Readings and Objectives

Reading assignments for the week:


Chapter 5 in Ethics in Information Technology.
Supplemental resource:


Truth or Fiction? Photography and Ethics.  A film available via our library - check out the folder in Course Documents and then Films on Demand and you'll find links to this and other videos in our library.


Learning objectives for the week:


Identify issues regarding freedom of expression as they apply to Internet communications.
Discuss current issues of information technology and freedom of expression.
Present an opinion about freedom of expression in our information age.
Being locating sources for a case study.


This week:


Okay, it is time to tackle some big issues this week. We are entering the area where government policy, political opinions, cultural values, and technology intersect. Do you enjoy discussing controversial topics? Then this is the week for you.


We are going to examine policies regarding pornography, national security, privacy, slander, libel, and our attitudes toward freedom of expression in these areas. Generally, Americans have strong opinions about freedom of expression. This chapter provides us with the opportunity to support our opinions with solid cases and precedents.


Looking for an interesting perspective on the topics for the week? Check out the supplemental resource listed above. It is a great way to find ideas to add to your discussion postings for the week.


The Internet definitely is changing our culture. Is it changing our attitudes toward freedom of expression? There is only one way to find out - let's discuss the issues and see where our discussions take us.


Have you finished the readings for the week?  Then let's get started on the weekly assignments.


  Week 5 - Video Overview
http://idcontent.bellevue.edu/content/CIT/cis/537/Week5.html


A brief video about our upcoming week.


  Week 5 - Thought for the Week
“What is freedom of expression? Without the freedom to offend, it ceases to exist.”  - Tony Blair


There is no assignment associated with this item, just a chance to pause and ponder.






  Week 5 - Image of the Week





"Portrait of Miss Margie Fellegi wearing a costume of a bonnet and a dress, open in the front to reveal short shorts, posing in front of a light-colored, wooden-framed screen in a room in Chicago, Illinois, for the 1927 Artists Ball."  Photo is in the public domain and available from the American Memory collection at the Library of Congress.


There is no assignment associated with this item, just a chance to pause and ponder.




  Week 5 - Chapter 5 Quiz
Read the assigned chapter this week in Ethics in Information Technology and then click on the link above to start the quiz.


The quizzes are a self-assessment and a participation grade. This means that you can take the quizzes as many times as you need in order to earn the grade you deserve. The idea is to allow you to self-test your reading comprehension.


Please do NOT try to print the quiz since that sometimes locks it up and prevents your score from being recorded. Simply take the quiz again if you need to review your readings and improve your score.


The quiz scores will be recorded each week, so be sure to take the quizzes in the weeks they are assigned. If you get a low score, then reread the material and take the quiz again.




  Week 5 Forum - Main Posting
Choose ONE of the following topics for your main discussion posting for the week. Generally, it takes several solid paragraphs for your main posting. Remember to provide a reference if you used a source for your information. Also, remember not to copy and paste from your sources - summarize and analyze in your own words.


Chapter 5 begins with a vignette called "Sexting." The case asks some important questions. Offer your opinons on those questions, and find a source to help support your opinions. Of course, please remember to provide a link or a reference for your source of information.


Chapter 5 has a Legal Overview titled "Children's Internet Protection Act (CIPA)." Imagine that you are a librarian at a city library. What would you do in order to comply with the law but also serve both adults and children at your library?


Let's put some ideas together. Appendix A and Chapter 1 discuss four philosophical theories for ethical decision making. This chapter discusses freedom of expression. Look in Course Documents at the case study on campaign blogs. It has a short case, a short video, and some thought-provoking questions.  Based on your reading of the four perspectives, what would you do as the political candidate?  Defend your decision.


National Security Letters are discussed in Chapter 5.  The text says that the issue is still under appeal.  Find a recent news article about this issue. What is the current status of National Security Letters?


Chapter 5 ends with a manager's checklist for handling freedom of expression in the workplace. How does your employer fare with this checklist?  Do you have any recommendations?


Imagine you are part of a committee to define your company's computer use policy. What advice would you give regarding Internet pornography?  Would you rather see a laissez-faire policy or strict enforcement of tough company guidelines?


A multimedia alternative: Imagine that you are a reporter for a local television station.  You have heard that pornography is available on the computers in the local library. The librarian insists that all required safeguards are in place. Post your two minute video news story about this controversy for your classmates to view. Obviously, you are free to make up the facts for your story as long as they are consistent with the information in our readings for the week.


Please see the information in the Assessment area of Course Documents if you aren't sure what a good discussion posting looks like.


This assignment is due in the Week 5 Forum at least two days before the end of our academic week.


  Week 5 Forum - Additional Postings
Post at least two additional messages during the week. More are always welcome. Typically, these messages are replies to your fellow students, or you can ask about details in the readings that puzzle you. See the assessment guide for more details if you aren't sure what a good posting looks like.


Post at least two additional messages in the Week 5 Forum before the end of our academic week.


  Week Five Essay - Opinion/Editorial
Your homework assignment is focused on the question of freedom of expression and the global reach of the Internet.


Congratulations, you are now a senior editor at CNN.  You often write news analysis on cultural issues that have a strong technology presence. Today, you and your editorial board had a wide-ranging discussion about freedom of expression and the Internet. Now, your job is to create an opinion piece for tomorrow's web page. You can write the opinion, or you can present it in a short video. 


Your board of editors is split between two basic perspectives:


Freedom of expression is under attack by socially conservative people who want everyone to be socially conservative. They hide behind 'protect the children' or 'protect national security' or 'protect the rights of business' when in fact they really want to control people and limit our freedoms.


Freedom of expression is not an absolute freedom, and new technologies make it important to exercise our freedoms in more responsible ways. We must balance our freedom to express ourselves with other freedoms and concerns. Socially-liberal people who push the limits of expression end up harming everyone's rights with their deliberately offensive and dangerous activities. Theyforce courts and businesses to push back with clearer limits, and that is harmful rather than helpful.


Compose a one page column or a short video segment for the CNN web site. The column is limited to one page, single-spaced, with a blank line between paragraphs. The video is limited to four minutes. Tell your readers why you favor one side or the other side of the argument.  Support your opinion with information from our reading for the week and/or an outside source. Remember, CNN has to 'sell the news,' so be sure that your column or video is snappy, fast-paced, hard-hitting, and interesting.


Submit either your Word-compatible document or your video to your instructor via the link below. Be sure this file is submitted before the end of our academic week.




>> View/Complete Assignment: Week Five Essay - Opinion/Editorial
  Looking Ahead to Next Week


This is just a reminder that Milestone 1 of your case study is due next week. Check the information in the Final Project area for more details.


This assignment is not due until Week 6.



William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager

M.S. in Cybersecurity Program at Bellevue University

CIS 537 Introduction to Cyber Ethics

CIS 608 Information Security Management

CYBR 515 - Security Architecture and Design

CYBR 510 Physical, Operations, and Personnel Security

Mastering Security

Career

Certifications

Credentials

ISO 27001

Chicago, IL
United States of America


Tuesday, December 27, 2011

Post 033 - CIS 537






The First Amendment - A Picture Is Worth 1000 Words, Two  Pictures, 2000 Words



CONSTITUTION OF THE UNITED STATES OF AMERICA, PROPOSED BY CONGRESS, AND RATIFIED BY THE LEGISLATURES OF THE SEVERAL STATES, PURSUANT TO THE FIFTH ARTICLE OF THE ORIGINAL CONSTITUTION


Article [I.]
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. 





References

Ballard, Spahr, Andrews, Ingersoll, LLC. (2004) Privacy Law. [Electronic version.] Retrieved from the web on May 14, 2004 at http://www.virtualchase.com/resources/privacy.html.


Brancik, K. C. (2008). Insider Computer Fraud: An In-depth Framework for Detecting and Defending Against Insider IT Attacks. Boca Raton, FL: Auerbach Publications.


Davis, C.; Schiller, M.; and Wheeler, K. (2007). IT Auditing: Using Controls to Protect Information Assets. New York, NY: Osborne McGraw Hill.


Department of Homeland Security. (2009).  (U//FOUO) Rightwing Extremism:  Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment.   Retrieved from the web at
http://www.fas.org/irp/eprint/rightwing.pdf    on December 24, 2011.

Department of Justice (2004).  USA PATRIOT Act at Work.  Retrieved from the web at

Doyle, C. (2002).  USA PATRIOT Act: A sketch.  Retrieved from the web at http://www.fas.org/irp/crs/RS21203.pdf  on December 24, 2011.

Doyle, C. (2010).  National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments - a CRS Report Dated December 27, 2010.  Retrieved from the web at  http://www.fas.org/sgp/crs/intel/RS22406.pdf  on December 24, 2011.

Electronic Privacy and Information Center Resources about the USA PATRIOT Act http://epic.org/privacy/terrorism/usapatriot/ .

EPIC. (2011). Information Related to the USA PATRIOT Act. Retreived from the web at http://epic.org/privacy/terrorism/usapatriot/  on December 9, 2011.


Frackman, A., Martin, R., and Ray, C. (2002). Internet and Online Privacy: A Legal and Business Guide. New York: ALM Publishing.


Galik, D. (1998). Defense in Depth: Security for Network-Centric Warfare. [Electronic version] Retrieved from the web on May 11, 2004 from http://www.chips.navy.mil/archives/98_apr/Galik.htm.

Gaskin, J. (1997). Corporate Politics and the Internet: Connection Without Controversy. Upper Saddle River, NJ: Prentice Hall.


Herrmann, D. S. (2007). Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI. Boca Raton, FL: Auerbach Publications.


Hoffman, L. J. (1977). Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ: Prentice-Hall.


Icove, D., et al. (1995). Computer Crime: A Crimefighter’s Handbook. Sebastopol, CA: O’Reilly & Associates.


Jacobs, S. (2011). Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance. Piscataway, NJ: IEEE Press.


Landy, G. K. (2008). the IT/Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media, and IP Law.  Burlington, MA: Syngress.
Lane, C. A. (1997). Naked in Cyberspace. Wilton, CT: Pemberton, Press.


Legal Information Institute. (2004). Right of Privacy, An Overview. An article from Cornell Law School. [Electronic version.] Retrieved from the web on May 14, 2004 at http://www.law.cornell.edu/topics/privacy.html .


McCrie, R. D. (2007). Security Operations Management, second edition. Burlington, MA: Elsevier.


Miles, G., et al. (2004) Security Assessment: Case Studies for Implementing the NSA IAM. Burlington, MA: Syngress Publishing, Inc.


Olsen, J. E. (2003). Data Quality: The Accuracy Dimension. San Francisco, CA: Morgan Kaufmann Publishers.


Reynolds, G. W. (2012). Ethics in Information Tehnology, 4th edition. Boston, MA: Course Technology.

Riggs, M. (2011).  Lee County Deputies Tied Suspect to a Chair, Gagged Him, and Pepper-Sprayed Him to Death.  An article published at Reason.com on December 23, 2011. Retrieved from the web at http://reason.com/blog/2011/12/23/lee-county-deputies-tied-suspect-to-a-ch on December  23, 2011.

Senft, A. and Gallegos, F. (2009). Information Technology Control and Audit. Bocan Raton, FL: CRC Press.


The White House. (2009). Cyberspace Policy Review. A document published by the Obama Administration. Retrieved from the web at http://info.publicintelligence.net/cyberspace_policy_review_final.pdf  on December 9, 2011.


ThinkExist.com. (2011).  Benjamin Franklin Quotes.  Retrieved from the web at http://thinkexist.com/quotation/those_who_desire_to_give_up_freedom_in_order_to/12888.html  on December 30, 2011.


U.S. Congress. (1987). The Computer Security Act of 1987. 101 STAT. 1724, Public Law 100-235, 100th Congress. Retrieved from the web http://www.nist.gov/cfo/legislation/Public%20Law%20100-235.pdf on December 9, 2011.


U.S. Government. (2009). American Recovery and Reinvestment Act of 2009. 101 STAT. 1724, Public Law 100-235, 100th Congress. Retrieved from the web http://www.opencongress.org/bill/111-s1/show on December 9, 2011.


U.S. Government.  (2001).  USA PATRIOT Act.  Retrieved from the web at  http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf   on December 24, 2011.

U.S. Government. (1776). The Declaration of Independence. Retrieved from the web at http://www.billslater.com/tj1776.htm  on November 6, 2011.

U.S. Government. (1791). U.S. Constitution. Retrieved from the web at

Whitman, M. E and Mattord, H. J. (2010). Management of Information Security, third edition: Indianapolis, IN: Course Technology.


Wikipedia. (2011). USA PATRIOT Act. A Wikipedia article retrieved from the web at

= = = = = = = = = = = = = = = = = = = = = = =
William Favre Slater, III
MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation
Project Manager / Program Manager

M.S. in Cybersecurity Program at Bellevue University

CIS 537 Introduction to Cyber Ethics

CIS 608 Information Security Management

CYBR 515 - Security Architecture and Design

CYBR 510 Physical, Operations, and Personnel Security

Mastering Security

Career

Certifications

Credentials

ISO 27001

Chicago, IL
United States of America