Related Reads
The International Information Systems Security Certification Consortium creates the certifications most known in the hacking world. More details can be found at https://www.isc2.org/uploadedFiles/(ISC)2_Public_Content/(ISC)2-Company-Overview.pdf
In particular, they develop the CISSP (for Leadership & Operations), CSSLP (Software Security), CCFP (Cyber Forensics), and many more.
In order to receive certification from (ISC)², you must agree to their code of ethics. To read their official code of ethics, please visit https://www.isc2.org/ethics/.
Due to legal issues (the copyright at the bottom of the page), I cannot copy the code of ethics bellow. Please visit the site and view the rest of the article side by side to the (ISC)² Code Of Ethics.
*Note: This article was written on Monday November 14.
The question I want to solve is a descriptive one. Rather than challenging the correctness of the code of ethics, I want to make an educated guess as to which ethical theory that the (ISC)² Code of Ethics is modeled after.
Disclaimer: I was not involved in creating the (ISC)² Code Of Ethics, nor have I done any certification from the organization. Knowing how the (ISC)² Code Of Ethics is based, one can build an argument of whether something is ethical or not by appealing to all of the parts of the (ISC)² Code Of Ethics.
I hope you really enjoyed this article. If you want to read something more practicle, check on my article on password security with paper! I got the idea from the video game Papers Please https://www.cybrary.it/0p3n/creating-secure-passwords-two-pieces-paper/
Have a great day!
Regards,
ProgrammerE
Did You Know?
Cybrary has tons of FREE training resources!
For lifetime access simply CREATE A FREE ACCOUNT.
Already a member? login here.
We recommend always using caution when following any link
Are you sure you want to continue?
I misspelled practical in the last paragraph.
I typed this in the browser instead of in notepad. I apologize for any additional spelling or grammer errors.