Code of ethics – ISC2

Code of ethics – ISC2: A set of professional principles adhered to by members of ISC2 (International Information System Security Certification Consortium), a non-profit organization specializing in training and certifications for cybersecurity professionals. The code stipulates four mandatory canons – Protect society, the common good, necessary public trust and confidence, and the infrastructure. Act honorably, […]

Code of ethics ISACA

Code of ethics ISACA: A set of principles specifically designed for IT governance, risk, cybersecurity, and assurance professionals. These principles stipulate professional standards for fairness, honesty, confidentiality, and professional competence. ISACA members and certification holders are required to adhere to this code, promoting trust and value in the industries they serve.

Code of Ethics

Code of Ethics: A guiding document that outlines expected behaviors and decision-making approaches within an organization or profession. It serves as a set of principles to guide professionals in carrying out their work with integrity, honesty, and responsibility. Violation of the code of ethics can lead to disciplinary actions, including termination of employment or membership.

Commercial Off-The-Shelf (COTS) Software

Commercial Off-The-Shelf (COTS) Software: A pre-packaged software that is readily available for purchase and use by organizations. It is used in businesses and government agencies to reduce the cost and time of software development. Examples include Microsoft Office and Adobe Photoshop.

Common Access Card (CAC)

Common Access Card (CAC): A type of identification card used by the US government and military to grant access to secure facilities and networks. The card contains a microprocessor chip that can store and transmit digital information, such as biometric data and security credentials. For example, military personnel may use their CAC card to enter […]

Common Criteria (CC)

Common Criteria (CC): An international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments. It provides a broad range of evaluation criteria for various types of products and systems, and its use can help to ensure a consistent and reliable level […]