Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:05
Hey, guys, My name is Peter Simple own, and this is the network Security course.
00:10
This is going to be module to less and three. And in this lesson, we're going to discuss ethics and really just some general data and data protection and privacy laws and regulations that you should be aware off.
00:26
Prerequisites for this lesson are module one and module two lessons one end to. So if you haven't watched those videos, just think of minute. Pause this and go back and check out them first.
00:42
So in this lesson, we're gonna learn why ethics are so important to cybersecurity. What ethics are really? And we're gonna take a look at laws, regulations and policies.
00:56
So let's get started into ethics.
00:59
Ethics are simply moral principles which govern a person's behavior. It's basically the driving force as to why anybody does what they do or right. It's the secret underlying force off what makes a person act in a certain way. Now wire ethics and cybersecurity so important
01:19
they're important because it is the only difference
01:21
between a good cybersecurity person and a bad cybersecurity person.
01:26
The good and the bad, the difference is simply this thin line, which is also known as ethics.
01:34
Good cyber people and bad cyber people really perform much of the same job and the same
01:41
techniques and the road. They really do pretty much the same thing. The only thing that differs is why they're doing it
01:49
now. Most security organizations have their own code of ethics. There's no one set standard code of ethics, but everyone kind of agrees on the same thing. Now I personally am a part of the I S C to organization, and the I C two
02:05
code of ethics is as follows Protect society, the common good and the necessary public trust.
02:12
Act honorably, justly, responsibly and legally
02:15
provide diligent and competent service, and it protect and advance the profession.
02:22
Now, since I am a member of the highest, see to it is it is my job, and I have a moral obligation to uphold these ethics as much as I possibly can.
02:35
So let's take a look at some very important laws and regulations. Ah, Similarly, as in the last video where we looked at the CW bees and the Si ves, there are just too many of them to know them all. It's too many to know, So it's better to know where to find them,
02:54
rather than kind of kind of having to remember all of them.
02:59
So a couple of really good places? A look. When it comes to laws and regulations, the first is Congress. One of the things Congress is really good at is keeping track of the laws and bills that are being passed and the documentation behind them. So individuals like you and me can go simply online to their website
03:19
and check it out.
03:20
Let's take a look at this one in more detail.
03:25
So if you come up here to the Congress dot gov website here, we can see that there's all kinds of current legislation, activities and information going on plenty of links you can click on. And but we want to search for current legislation and cybersecurity.
03:44
So we're gonna take a look at this year.
03:49
So if we search for cyber security,
03:52
we can see that there are currently quite a few ah cybersecurity bills currently being tracked. Right now we have this top one here securing American research from Cyber Theft Act. This one has just been introduced.
04:06
A couple of these have been introduced. This one has actually already passed the House and the Senate. So seconds headed to the president's desk, and there's really just a whole bunch of information you can kind of look here and see who sponsors it. What job is supposed to dio and was one of the current updates. Now you can limit your search
04:26
to some of these search techniques on the left,
04:29
or if you just happen to know the bill number or any of that information, you can type it up here
04:34
in the search bar.
04:42
The next is an ISA. This is kind of like the European version off the National Cyber Security Agency.
04:50
They have. They have some more things on Lee. Their stuff is focused mainly on obviously the U and their website can be found right here.
05:01
If you needed to look at any type of topics, or if you want to know what's going on, you can kind of browse around in here and see what's happening when, when it comes to cyber security in the European Union,
05:15
then also, the last one is missed. The National Institute of Standards and Technology. This is run by the Department of Commerce and here. Basically, this provides the the basically general practice standards for almost almost everything.
05:34
Now, cybersecurity is just like a very small part
05:38
off the standards and technology, obviously, so we can come down here to the topic section, we can click on cybersecurity and that we are in the cybersecurity topic section. From there you can choose the substrate framework. You can see the privacy framework. You can check out the initiative for cybersecurity
05:58
education. So when in doubt,
06:00
come come to nest when it comes to cyber security, If you don't have to implement something, see what the NIST standards and guidelines therefore missed also has a whole lot of publications that you can click on on. Then, from there you can really just search cybersecurity,
06:19
and you can come up with a whole bunch of cybersecurity publications that you can read that shows how to properly implement pretty much anything You wanted to know
06:32
some important laws and regulations that you should know. These are the ones you should be very familiar with, and the 1st 1 is hip up. That's a very well known one that all has to do with health insurance and the privacy regarding that.
06:46
There's the Gramm Leach Bliley Act, which is really health, which is basically determines how financial institutions handle sensitive information of the customers. There is the Homeland Security Act, which really formed the Homeland Security yum
07:03
back in 2002.
07:06
And then finally there is the GDP are, which is the popular data privacy regulation going on in Europe right now.
07:16
In today's video, we discussed ethics and why they are important. And we also took a look at some notable security laws and why they are poured in, as well as checking out where's a good spot to look for security laws, bills, frameworks and anything that you could possibly want to know about. Cyber security
07:36
Quiz time. All of these air good organizations the find information on cyber walls and regulations except a n'est
07:46
be socks.
07:47
See Congress D in CIA.
07:54
If you said
07:56
be socks than you are correct, Socks is sure hand for Sarbanes Oxley, and it's a wall, not an organization for cyber laws and regulations.
08:07
Hope you guys learned a lot in this video, and I'll see you next time

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor