Chapter 5: Will Your Future Be in Cybersecurity?

Slides:



Advertisements
Similar presentations
Lesson 1: Introduction to IT Business and Careers
Advertisements

Computer Security and Penetration Testing
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Chapter 29 Ethics in Accounting
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
1 © 2002, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Networking Academy Program Prepare Yourself for 21 st Century IT.
Read to Learn Define ethics and business ethics. Describe why ethical behavior is good for business. List the steps for dealing with an ethical dilemma.
Chapter 1 - Introduction to Law and Ethics 1-1 McGraw-Hill © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
Professional Business Ethics © 2000 South-Western Educational Publishing Introduction to Business Ethics Ethics The principles of right and wrong that.
{ FBLA Competitive Events Spring  To prepare students for successful careers in business, these events assess students in the various knowledge,
Copyright © 2013 by The National Restaurant Association Educational Foundation. Published by Pearson. All rights reserved. HOSPITALITY HUMAN RESOURCES.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Chapter 4 Business Ethics and Social Responsibility.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
CONDUCTING CYBERSECURITY RESEARCH LEGALLY AND ETHICALLY By Aaron J. Burstein; Presented by David Muchene.
Information Management Chapter 12. Learning Objectives Describe the purpose of data collection and reporting. Identify the data that should be collected.
BUSINESS ETHICS Why is Business Ethics important in Business.
Ethics-Part I BCS-BE-11: The student compares and contrasts common ethical issues BCS-BE-12: The student evaluates personal responsibility of ethical behavior.
Organizational Justice, Ethics, and Corporate Social Responsibility Chapter 2.
No School on Monday Professional Development for Teacher
Of XX Cybersecurity in Government Contracting, Acquisition and Procurement Nicholas R. Schacht ©2015 PubKLearning. All rights reserved.1 KnowCyber improves.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Bell Ringer Activity A neighbor offered you $15 for picking up her mail. Afterward, she gives you $20 and refuses change. She actually gave you two twenties.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
The Chief Legal Officer’s View of In-House Pro Bono October 20, Connecticut Avenue, N.W., Suite 205  Washington, DC (202)  (202)
MIS323 – Business Telecommunications Chapter 10 Security.
Mrs. Ransey Business Essentials
Chapter Finance and Economics in the Sport Industry Timothy D. DeSchriver, University of Delaware Daniel F. Mahony, Kent State University C H A P.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
1.04 Ethics in healthcare Understand legal and ethical issues Healthcare professionals’ ethical obligations Ethics Standard of conduct or code of.
Chapter 4 Business Ethics & Social Responsibility
1.04 Ethics in healthcare.
Professional Codes of Ethics
Computer Programming Career Opportunities.
Instructor Materials Chapter 1: Explore the Network
Chapter 13: The IT Professional
Instructor Materials Chapter 13: The IT Professional
Master’s Degree Program in Business Compliance Assurance
Instructor Materials Chapter 8: Subnetting IP Networks
CHAPTER 4 LEGAL AND ETHICAL PRINCIPLES
Risk Management for Technology Projects
1.04 Healthcare Ethics.
Chapter 8: Subnetting IP Networks
1.04 Ethics in healthcare.
Chapter 1 - Introduction to Law and Ethics
Technology, Careers, and Job Hunting
Essentials of Managing Human Resources 5ce
CCJ 3450 Innovative Education--snaptutorial.com
Virginia Union University
Introduction to Lesson 7 Exploring green careers
1.04 Ethics in healthcare.
Lesson 3- Managing Ethically
Csilla Farkas Cybersecurity Csilla Farkas
Sessions 7&8. Organizational Ethics
Internet law Business law.
Computer Security Fundamentals
ROUNDTABLE 2 Laying Ground for Successful University-Business-Industry Cooperation in Doctoral Education: How to Prepare Doctoral Candidates to Work.
Chapter 1: The Need for Cybersecurity
I UNDERSTAND CONCEPTS OF CYBERSECURITY
1.04 Ethics in healthcare.
Lesson 3- Managing Ethically
Experience Works General Session II June 27, 2017
1.04 Ethics in healthcare.
How Law is related to Engineering
Chapter 13: The IT Professional
1.04 Ethics in healthcare.
Presentation transcript:

Chapter 5: Will Your Future Be in Cybersecurity? Instructor Materials Introduction to Cybersecurity v2.1 Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 5: Will Your Future Be in Cybersecurity?

Chapter 5: Will Your Future Be in Cybersecurity? Introduction to Cybersecurity v2.1 Planning Guide Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 5: Will Your Future Be in Cybersecurity?

Chapter 5: Will Your Future Be in Cybersecurity? Introduction to Cybersecurity v2.1 Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 5: Will Your Future Be in Cybersecurity?

Chapter 5 - Sections & Objectives 5.1 Cybersecurity Education and Careers Explain the legal and ethical issues facing cybersecurity professionals Describe the legal and ethical issues facing a cybersecurity professional. Cisco Networking Academy Program Introduction to Cybersecurity v2.0 Chapter 5: Will Your Future Be in Cybersecurity? 9

5.1 Cybersecurity Education and Careers 5 – Will Your Future Be in Cybersecurity? 5.1 – Cybersecurity Education and Careers

Legal and Ethical Issues in Cybersecurity Careers Legal Issues in Cybersecurity Personal Legal Issues Be responsible with your skills Corporate Legal Issues Businesses are required to abide by the cybersecurity laws. Break the law, you could lose your job and your company could be punished. When you are not sure, you should consult legal department. International Law and Cybersecurity IMPACT global partnership of world governments, industries and academia Improving global capabilities when dealing with cyber threats 5.1 – Cybersecurity Education and Careers 5.1.1 – Legal and Ethical Issues in Cybersecurity Careers 5.1.1.1 – Legal Issues in Cybersecurity

Legal and Ethical Issues in Cybersecurity Careers Ethical Issues in Cybersecurity Personal Ethical Issues Legal behavior may still be unethical. Corporate Ethical Issues Ethics are codes of behavior that are sometimes enforced by laws. Organizations with Published Codes of Ethics: The CyberSecurity Institute (CSI) The Information Systems Security Association (ISSA) The Association of Information Technology Professionals (AITP) 5.1 – Cybersecurity Education and Careers 5.1.1 – Legal and Ethical Issues in Cybersecurity Careers 5.1.1.2 – Ethical Issues in Cybersecurity

Legal and Ethical Issues in Cybersecurity Careers Cybersecurity Jobs Some online job search engine ITJobMatch Monster CareerBuilder Different types of cybersecurity jobs Penetration testing / ethical hacker Security administrator Network administrator System administrator 5.1 – Cybersecurity Education and Careers 5.1.1 – Legal and Ethical Issues in Cybersecurity Careers 5.1.1.3 – Cybersecurity Jobs

5.1 Chapter Summary 5 – Will Your Future Be in Cybersecurity?

Summary Chapter Summary Describe the legal and ethical issues. 5.2 – Summary 5.2.1.1 – Chapter summary