{"id":556,"date":"2021-06-30T10:07:15","date_gmt":"2021-06-30T02:07:15","guid":{"rendered":"https:\/\/choson_steven.lifenet.com.tw\/?p=556"},"modified":"2023-03-29T16:37:38","modified_gmt":"2023-03-29T08:37:38","slug":"isc%c2%b2-%e9%81%93%e5%be%b7%e8%a6%8f%e7%af%84code-of-ethics-canons","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=556","title":{"rendered":"(ISC)\u00b2 \u9053\u5fb7\u898f\u7bc4(Code of Ethics Canons)"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210630\/20132160MknpMFrl31.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210630\/20132160MknpMFrl31.jpg\"><br>-\u9053\u5fb7\u5728\u65b0\u7684 CISSP \u8003\u8a66\u5927\u7db1\u4e2d\u540d\u5217\u524d\u8305<\/p>\n\n\n\n<p><strong>\u9053\u5fb7\u898f\u7bc4(Code of Ethics Canons)<\/strong><br>. \u4fdd\u8b77\u793e\u6703\u3001\u5171\u540c\u5229\u76ca\u3001\u5fc5\u8981\u7684\u516c\u773e\u4fe1\u4efb\u548c\u4fe1\u5fc3\u4ee5\u53ca\u57fa\u790e\u8a2d\u65bd\u3002<br>. \u4ee5\u5149\u69ae\u3001\u8aa0\u5be6\u3001\u516c\u6b63\u3001\u8ca0\u8cac\u4efb\u548c\u5408\u6cd5\u7684\u65b9\u5f0f\u884c\u4e8b\u3002<br>. \u70ba\u6821\u9577(principals)\u63d0\u4f9b\u52e4\u52c9\u548c\u7a31\u8077\u7684\u670d\u52d9\u3002<br>. \u63a8\u9032\u548c\u4fdd\u8b77\u8077\u696d\u3002<\/p>\n\n\n\n<p><strong>\u9053\u5fb7\u6295\u8a34\u7a0b\u5e8f(Ethics Complaint Procedures)<\/strong><br>\u4ee5\u4e0b\u6458\u81ea(ISC)\u00b2 \u9053\u5fb7\u898f\u7bc4\uff1a<br>. \u8a72\u502b\u7406\u59d4\u54e1\u6703\u662f\u7531\u8463\u4e8b\u6703\u6210\u7acb\u807d\u5230\u6240\u6709\u7684\u9053\u5fb7\u6295\u8a34\u548c\u63d0\u51fa\u5efa\u8b70\u8463\u4e8b\u6703\u3002<br>. \u59d4\u54e1\u6703\u5c07\u53ea\u8003\u616e\u5177\u9ad4\u8aaa\u660e\u6211\u5011\u7684 (ISC)\u00b2 \u9053\u5fb7\u6e96\u5247\u4e2d\u5df2\u88ab\u9055\u53cd\u7684\u6295\u8a34\u3002<br>. \u96d6\u7136\u4efb\u4f55\u516c\u773e\u90fd\u53ef\u4ee5\u6295\u8a34Canons I \u6216 II\u7684\u9055\u898f\u884c\u70ba\uff0c\u4f46\u53ea\u6709\u8ca0\u8cac\u4eba\uff08\u8207\u8b49\u66f8\u6301\u6709\u8005\u6709\u96c7\u4e3b\/\u627f\u5305\u5546\u95dc\u4fc2\u7684\u4eba\uff09\u53ef\u4ee5\u6295\u8a34Canons III \u7684\u9055\u898f\u884c\u70ba\uff0c\u4e26\u4e14\u53ea\u6709\u5176\u4ed6\u5c08\u696d\u4eba\u58eb\uff08\u90a3\u4e9b\u7372\u5f97\u8a8d\u8b49\u6216\u7372\u5f97\u5c08\u696d\u57f7\u7167\u4e26\u9075\u5b88\u9053\u5fb7\u6e96\u5247\uff09\u53ef\u80fd\u6703\u6295\u8a34\u9055\u53cd\u4f73\u80fd IV \u7684\u884c\u70ba\u3002<br>. \u50c5\u63a5\u53d7\u8072\u7a31\u56e0\u6240\u6307\u63a7\u7684\u884c\u70ba\u800c\u53d7\u50b7\u7684\u4eba\u7684\u6295\u8a34\u3002<br>. \u6240\u6709\u6295\u8a34\u5fc5\u9808\u4ee5\u66f8\u9762\u5f62\u5f0f\u63d0\u51fa\u3002\u6295\u8a34\u5fc5\u9808\u63a1\u7528\u5ba3\u8a93\u66f8\u7684\u5f62\u5f0f\u3002\u59d4\u54e1\u6703\u4e0d\u6703\u8003\u616e\u4efb\u4f55\u5176\u4ed6\u5f62\u5f0f\u7684\u6307\u63a7\u3002<br>. \u5982\u679c\u8868\u9762\u8b49\u64da\u78ba\u947f\uff0c\u9053\u5fb7\u59d4\u54e1\u6703\u5c07\u5be9\u67e5\u4e26\u5411\u8463\u4e8b\u6703\u63d0\u51fa\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/www.isc2.org\/Ethics\" target=\"_blank\" rel=\"noreferrer noopener\">(ISC)\u00b2 \u9053\u5fb7\u6e96\u5247<\/a><br>.&nbsp;<a href=\"https:\/\/www.isc2.org\/Policies-Procedures\/Events-Code-of-Conduct\" target=\"_blank\" rel=\"noreferrer noopener\">(ISC)\u00b2 \u6d3b\u52d5\u884c\u70ba\u6e96\u5247<\/a><br>.&nbsp;<a href=\"https:\/\/www.studynotesandtheory.com\/single-post\/are-you-ethical-enough-to-be-a-cissp\" target=\"_blank\" rel=\"noreferrer noopener\">\u4f60\u6709\u8db3\u5920\u7684\u9053\u5fb7\u6210\u70ba CISSP \u55ce\uff1f<\/a><br>.&nbsp;<a href=\"https:\/\/www.scu.edu\/media\/ethics-center\/technology-ethics\/IntroToCybersecurityEthics.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u7db2\u7d61\u5b89\u5168\u502b\u7406\u7c21\u4ecb<\/a><br>.&nbsp;<a href=\"https:\/\/www.first.org\/global\/sigs\/ethics\/ethics-first\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e8b\u4ef6\u97ff\u61c9\u548c\u5b89\u5168\u5718\u968a\u7684\u9053\u5fb7\u898f\u7bc4<\/a><br>.&nbsp;<a href=\"https:\/\/plato.stanford.edu\/entries\/common-good\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5171\u540c\u5229\u76ca<\/a><br>.&nbsp;<a href=\"https:\/\/www.findlaw.com\/criminal\/criminal-procedure\/what-is-a-jury-of-peers.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u4ec0\u9ebc\u662f\u540c\u884c\u8a55\u5be9\u5718\uff1f<\/a><br>.&nbsp;<a href=\"http:\/\/www.ethicsweb.ca\/codes\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u70ba\u60a8\u7684\u7d44\u7e54\u88fd\u5b9a\u9053\u5fb7\u6e96\u5247<\/a><br>.&nbsp;<a href=\"https:\/\/surna.com\/investor-relations\/governance\/code-of-ethics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Surna Inc. \u5546\u696d\u884c\u70ba\u8207\u9053\u5fb7\u6e96\u5247<\/a><br>.&nbsp;<a href=\"https:\/\/www.gypthecat.com\/3-ethical-dilemma-for-information-security-professionals\" target=\"_blank\" rel=\"noreferrer noopener\">3 \u4fe1\u606f\u5b89\u5168\u5c08\u696d\u4eba\u54e1\u7684\u9053\u5fb7\u56f0\u5883<\/a><br>.&nbsp;<a href=\"https:\/\/www.gypthecat.com\/3-ethical-dilemma-for-information-security-professionals\" target=\"_blank\" rel=\"noreferrer noopener\">\u7db2\u7d61\u5b89\u5168\u502b\u7406\u7684\u56b4\u5cfb\u6311\u6230<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/04\/12\/cissp-practice-questions-20210413\/\" target=\"_blank\">Wentz Wu QOTD-202104013<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>-\u9053\u5fb7\u5728\u65b0\u7684 CISSP \u8003\u8a66\u5927\u7db1\u4e2d\u540d\u5217\u524d\u8305 \u9053\u5fb7\u898f\u7bc4(Code of Ethics Canons). \u4fdd\u8b77\u793e [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-556","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=556"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/556\/revisions"}],"predecessor-version":[{"id":2855,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/556\/revisions\/2855"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}