I received an email about this yesterday from a reader, Vick. There are accusations on the ‘Net that large parts of the Official (ISC)2 Guide to the CISSP Exam were plagiarized. This isn’t a minor accusation, especially when it’s about a company like the (ISC)2 who subscribes to a code of ethics. I wanted to see some form of verification before I said anything on the blog. Well, I just got a link in the mail (Thanks Kevin). The messageboard post lists a couple of articles that are available online and were lifted wholesale and put in the book.
Strictly speaking, I don’t think the onus for policing the content of the book really lies with the (ISC)2; they probably paid a publisher who commissioned a writer, or several writers, to write the book. But that’s no excuse for this happening. Plagarism may not be a crime, but it is a policy and ethics violation that looks bad for the writer, looks bad for the publisher and leaves the (ISC)2 with egg on their face.
I don’t have a copy of the Guide, and I’m probably not going to go out and purchase one just to verify the accusations of plagiarism. But if someone else who has a copy of the book would look at the articles mentioned and the pages in the Guide and do a comparison, I’d love to hear what you have to say. I’m hoping that this is a misunderstanding and that the guide gives credit to the original authors in the bibliography. If not, the (ISC)2 has some ‘splaining to do.
Technorati Tags: security, ISC2, ethics
It’s good to be back at home for the podcast. I was missing my main microphone and a good set of headphones. I had a minor allergy attack in the middle of the podcast, so please excuse any sniffles I missed in editing. Tonight’s episode is my wrapup of the RSA Convention, and unluckily I wasn’t overly impressed. Next year’s show is supposed to be back in San Francisco, which will hopefully make it better.
Tonight’s music was evolution by the Lemmings
Network Security Podcast, Episode 15, February 21, 2006
Duration: 31:00 minuts
Giant Squid Audio Lab
Invasion of the Computer Snatchers
Internet Storm Center
Technorati Tags: security, podcast, privacy, PCI, Mac