Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: April 3rd, 2022

Security Recovery Plan Policy

Security Recovery Plan Policy
Write a paper focused on the ethical implications of the cybersecurity policy. What are the ethical implications that arise from the cybersecurity policy/strategy you have selected? This should be a two-page paper describing the ethical issues that arise when considering the cybersecurity policy/strategy you have selected. Attention should be given to the costs and benefits of the policy/strategy, the types of rights that are protected and potentially limited with the policy/strategy, and whether the policy/strategy appropriately addresses individuals’ rights. The paper must include at least three scholarly journal articles that support the discussion. PLEASE HAVE 3 SCHOLARLY JOURNAL ARTICLES. I have also attached the paper writer 148234 has done on security recovery plan..

Security Recovery Plan Policy
Security recovery policy plan is designed to limit disruption of the information technology and maintenance of information technology operations (Christen, Gordijn, and Loi, 2020). The security recovery police plan is generally designed to stop, learn, and Help security, management deal with an incident. Security recovery plan policy is an essential policy, especially in “protecting forward”, which prevents future losses. Mostly a security recovery policy plan is developed and implemented together with a disaster recovery plan (Gourisetti, et, al.,2020). The paper is a discussion of the security recovery policy plan and its ethical implications.
The security recovery policy plan faces several ethical implications for stance those concerning transparency and resource disclosure. Other issues include the harm of privacy, such as identity threat, corporate misconduct, and espionage. Cybersecurity resource allocation is a widespread ethical implication in security recovery policy, especially concerning the policy’s cost and benefits. Resources in security recovery policy include money, time, and security expertise (Christen, Gordijn, and Loi, 2020). Most of the time, planning a security recovery is expensive compared to the benefits because the organization is not yet aware of future security threats and their impacts. However, the organization should estimate and measure the total cost of ownership relative to the cost of a security disaster. Also, having inadequate resources for security recovery is an unethical implication for a security recovery policy plan (Gourisetti, et, al.,2020). For instance, the lack of a security incident plan for every threat or anticipated incident or worst-case incidental.
On the other hand, payment of a ransom to attackers to limit and recover lost data is another ethical implication that is considered unethical. Payment of ransom ethical issue may put the organization into ransomware vulnerability. The government and politicians play an important role when it comes to insufficient and lack of resources, through lack of a strong resource foundation, corruption, and poor governance Payment of ransom may affect the reputation and network users in the organizations (Christen, Gordijn, and Loi, 2020). The security team should follow and adhere to the ethics codes and standards of behaviours according to data processing, management association, the association for computing machinery, and the institute for computer professionals’ certificates. During the forward approach, the system may go through a structural, catastrophic and logical failure. For example, during the recovery process, the system may fail to restore data (Gourisetti, et, al.,2020).
The security recovery plan policy faces several ethical implications based on employees’ rights, for example, the right to privacy and confidentiality (Christen, Gordijn, and Loi, 2020). The security recovery policy should minimize any possibility of privacy invasion, especially when using the staff’s employees’ information. The security recovery plan policy must add various controls, such as physical safety controls, password, monitoring controls, database integrity and data validation techniques (Timmers, 2019). The security recovery plan maintains the individual’s rights through the use of monitoring skills that limit the intrusion of the user’s privacy. The security policy limits any unjustifiable unethical intrusion, such as reading users emails, tracking user’s website visits, and physical location.
On the other hand, users are aware of the ongoing security monitoring activities, such as monitoring users network activities, to discuss and adhere to the user’s privacy rights and requirements (Christen, Gordijn, and Loi, 2020). The security recover policy balances security and other values, such as commitments, transparency, and sincerity. Also, the security recovery policy should justify resource allocation and be able to fulfil security promises to its stakeholders, users, and employees.

References
Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity (p. 384). Springer Nature.
Gourisetti, S. N. G., Reeve, H., Rotondo, J. A., & Richards, G. T. (2020). Facility Cybersecurity Framework Best Practices (No. PNNL-30291). Pacific Northwest National Lab. (PNNL), Richland, WA (United States).
Timmers, P. (2019). Ethics of AI and cybersecurity when sovereignty is at stake. Minds and Machines, 29(4), 635-645.

Order | Check Discount

Tags: affordable dissertation writing service, best dissertation writing services uk, cheap custom essay writing services, custom research paper writers, custom research papers writing service

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00