This preview shows page 1. Sign up to view the full content.
Unformatted text preview: de cellular scanners, radio receivers, microphone receivers, tape recorders, network sniffers, and telephone-tapping devices.
NOTE A passive attack is nonintrusive, as in eavesdropping or wiretapping.
An active attack, on the other hand, is intrusive, as in DoS or penetration
It is illegal to intentionally eavesdrop on another person’s conversation under many
countries’ existing wiretap laws. In many cases, this action is only acceptable if the person consents or there is a court order allowing law enforcement to perform these types
of activities. Under the latter circumstances, the law enforcement officers must show
probable cause to support their allegation that criminal activity is taking place and can
only listen to relevant conversations. These requirements are in place to protect an individual’s privacy rights. Ethics
Just because something is not illegal does not make it right.
Ethics are based on many different issues and foundations. They can be relative to
different situations and interpreted differently from individual to individual. Therefore,
they are often a topic of debate. However, some ethics are less controversial than others,
and these types of ethics are easier to expect of all people.
(ISC)2 requires all certified system security professionals to commit to fully supporting its Code of Ethics. If a CISSP intentionally or knowingly violates this Code of
Ethics, he or she may be subject to a peer review panel, which will decide whether the
certification should be relinquished.
The full set of (ISC)2 Code of Ethics for the CISSP is listed on the (ISC)2 site at
https://www.isc2.org/cgi-bin/content.cgi?category=12. The following list is an overview, but each CISSP candidate should read the full version and understand the Code
of Ethics before attempting this exam:
• Act honorably, honestly, justly, responsibly, and legally, and protect society.
• Work diligently, provide competent services, and advance the security
• Encourage the gr...
View Full Document
- Fall '12