Overview
- Provides the clarity, awareness and understanding into concepts and ideas that are currently not well defined in the delicate and complex interaction between technology and ethics
- Defines the middle ground between worlds of ethics and code as the unstoppable explosion of data and connectivity around the globe puts the world of technology on a collision course with ethics
- Written by industry leaders with decades of work in corporate offices, small business, and hyper-scale cloud and engineering environments. This book contains lessons learned from difficult situations and problems with real impact on customers
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see howto correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments.
Using the appropriate rules of engagement, best policies and practices, and proactive “building/strengthening” behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment.
What You'll Learn
- The concepts of Least Privilege and Need to Know
- Request change approval and conduct change communication
- Follow "Break Glass" emergency procedures
- Code with data breaches, hacking and security violations, and proactively embrace and design for failures
- Build and gain trust with employees and build the right ethical culture
- Review what managers can do to improve ethics and protect their employees
Who This Book Is For
This book’s primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.
Similar content being viewed by others
Keywords
Table of contents (10 chapters)
Authors and Affiliations
About the authors
Tom Litterer is a business leader and a future-focused thinker with threedecades of experience in the industry. Tom spent the first six years of his career as a UNIX system administrator, transitioning from novice to expert. He has since managed each of the key areas within IT, including help desk, site operations, high performance computing (HPC) services, identity and access management, lab operations, internal cloud deployment, engineering tools and licensing. He was also the global manager of Intel’s HPC servers and storage chip design environment. Tom is currently the Associate Director of Data Center and Cloud Infrastructure at Portland State University (PSU), Oregon, US. In this role, he is responsible for all Linux, Windows, virtualization, storage, backup, and HPC services in local data centers as well as the university’s cloud infrastructure.
Bibliographic Information
Book Title: System Administration Ethics
Book Subtitle: Ten Commandments for Security and Compliance in a Modern Cyber World
Authors: Igor Ljubuncic, Tom Litterer
DOI: https://doi.org/10.1007/978-1-4842-4988-8
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Apress Access Books, Professional and Applied Computing (R0)
Copyright Information: Igor Ljubuncic, Tom Litterer 2019
Softcover ISBN: 978-1-4842-4987-1Published: 31 October 2019
eBook ISBN: 978-1-4842-4988-8Published: 30 October 2019
Edition Number: 1
Number of Pages: XXXI, 290
Number of Illustrations: 18 b/w illustrations
Topics: Security, Business Ethics, Systems and Data Security