Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: October 13th, 2022

Security Recovery Plan Policy

Security Recovery Plan Policy
Homework help – Write a paper focused on the ethical implications of the cybersecurity policy. What are the ethical implications that arise from the cybersecurity policy/strategy you have selected? This should be a two-page paper describing the ethical issues that arise when considering the cybersecurity policy/strategy you have selected. Attention should be given to the costs and benefits of the policy/strategy, the types of rights that are protected and potentially limited with the policy/strategy, and whether the policy/strategy appropriately addresses individuals’ rights. The paper must include at least three scholarly journal articles that support the discussion. PLEASE HAVE 3 SCHOLARLY JOURNAL ARTICLES. I have also attached the paper writer 148234 has done on security recovery plan..

Security Recovery Plan Policy
Security recovery policy plan is designed to limit disruption of the information technology and maintenance of information technology operations (Christen, Gordijn, and Loi, 2020). The security recovery police plan is generally designed to stop, learn, and assist security, management deal with an incident. Security recovery plan policy is an essential policy, especially in “protecting forward”, which prevents future losses. Mostly a security recovery policy plan is developed and implemented together with a disaster recovery plan (Gourisetti, et, al.,2020). The paper is a discussion of the security recovery policy plan and its ethical implications.
The security recovery policy plan faces several ethical implications for stance those concerning transparency and resource disclosure. Other issues include the harm of privacy, such as identity threat, corporate misconduct, and espionage. Cybersecurity resource allocation is a widespread ethical implication in security recovery policy, especially concerning the policy’s cost and benefits. Resources in security recovery policy include money, time, and security expertise (Christen, Gordijn, and Loi, 2020). Most of the time, planning a security recovery is expensive compared to the benefits because the organization is not yet aware of future security threats and their impacts. However, the organization should estimate and measure the total cost of ownership relative to the cost of a security disaster. Also, having inadequate resources for security recovery is an unethical implication for a security recovery policy plan (Gourisetti, et, al.,2020). For instance, the lack of a security incident plan for every threat or anticipated incident or worst-case incidental.
On the other hand, payment of a ransom to attackers to limit and recover lost data is another ethical implication that is considered unethical. Payment of ransom ethical issue may put the organization into ransomware vulnerability. The government and politicians play an important role when it comes to insufficient and lack of resources, through lack of a strong resource foundation, corruption, and poor governance Payment of ransom may affect the reputation and network users in the organizations (Christen, Gordijn, and Loi, 2020). The security team should follow and adhere to the ethics codes and standards of behaviours according to data processing, management association, the association for computing machinery, and the institute for computer professionals’ certificates. During the forward approach, the system may go through a structural, catastrophic and logical failure. For example, during the recovery process, the system may fail to restore data (Gourisetti, et, al.,2020).
The security recovery plan policy faces several ethical implications based on employees’ rights, for example, the right to privacy and confidentiality (Christen, Gordijn, and Loi, 2020). The security recovery policy should minimize any possibility of privacy invasion, especially when using the staff’s employees’ information. The security recovery plan policy must add various controls, such as physical safety controls, password, monitoring controls, database integrity and data validation techniques (Timmers, 2019). The security recovery plan maintains the individual’s rights through the use of monitoring skills that limit the intrusion of the user’s privacy. The security policy limits any unjustifiable unethical intrusion, such as reading users emails, tracking user’s website visits, and physical location.
On the other hand, users are aware of the ongoing security monitoring activities, such as monitoring users network activities, to discuss and adhere to the user’s privacy rights and requirements (Christen, Gordijn, and Loi, 2020). The security recover policy balances security and other values, such as commitments, transparency, and sincerity. Also, the security recovery policy should justify resource allocation and be able to fulfil security promises to its stakeholders, users, and employees.

References
Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity (p. 384). Springer Nature.
Gourisetti, S. N. G., Reeve, H., Rotondo, J. A., & Richards, G. T. (2020). Facility Cybersecurity Framework Best Practices (No. PNNL-30291). Pacific Northwest National Lab. (PNNL), Richland, WA (United States).
Timmers, P. (2019). Ethics of AI and cybersecurity when sovereignty is at stake. Minds and Machines, 29(4), 635-645.

Order | Check Discount

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.