In: Computer Science
Understanding of professional responsibilities, ethical theories, legal and social issues.
Understanding of cyber security threats and corresponding procedures to mitigate these threats.
Understanding of risk management, security policies and audit
procedures
1. Professional responsibility
Professional responsibility is the area of legal practice that encompasses the duties are main function of attorneys to act in a professional manner, obey the law, avoid conflicts of interest, and put the interests of clients ahead of their own interests of field
2. Ethical Theories
Ethical Theory ,is four broad categories of ethical theory include deontology, utilitarianism, rights, and virtues. The deontological class of ethical theories states that people should adhere to their obliga- tions and duties when engaged in decision making when ethics are in play.So,Ethical Theories are more valuable and functionable
3. Legal And Social issues
Communicating Test Results,Direct to Consumer Tests, Duty to DIsclose,Genetic Descrimination,Informed Consent,Privacy,Psychosocial Impact,Societal Values,Test Utility,Test validity.
4. Cyber Security threats and Corresponding proceduresto mitigate threats
1.Inadequate patch management process.
2.Unnecessary system access.
3.Inadequate change and configuration management.
4.Inadequate periodic security audits.
5.Inadequate continuity of operations and disaster recovery plan.
6.Inadequate risk assessment process.
7.Inadequate risk management process.
8.Inadequate incident response process.
5. Risk Management,Security Policices and Audit procedures
Risk Management:
Risk Management is defined as the process of identifying, monitoring and managing potential risks in order to minimize the negative impact they may have on an organization. Examples of potential risks include security breaches, data loss, cyber attacks, system failures and natural disasters.So, Risk Management is more effectively perform.
Security Policies:
security policy is a written document in an organization outlining how to protect the organization from threats, including computer security threats, and how to handle situations when they do occur. A security policy must identify all of a company's assets as well as all the potential threats to those assets
Audit procedures:
Audit procedures are the steps that the auditors from an audit firm would carry out to acquire all the information related to the quality of the financial statements that a company has provided.
So these are the Risk Management, security policies and audit procedures