LAW 770 704: Week 1 Discussion: Cybersecurity: Recognition vs. Plans vs. Actions

One conceptual model for cybersecurity suggests that an organization must go through 

four phases in dealing with cybersecurity.

  • First, the organization has to acknowledge that the risk is there, that it is real, and that it affects the particular organization. (Acknowledge/Assess Risks and Outline Solutions.)
  • Second, resources must be provided to develop standards and procedures for a commercially reasonable cybersecurity program. (Develop the Program)
  • Third, based on the standards and procedures you’ve built, you have to be certain that they have actually been implemented. (Implement and Audit the Program)
  • Finally, based on monitoring the technology environment and the organization’s particular need, the organization has to update its cybersecurity as threats/risks are recognized and as the organization evolves its business models. (Monitor the Environment and Apply Lessons Learned)
  • https://www.ibm.com/topics/data-breach

Does this model seem reasonable to you? Why or why not? What do you see as practical steps for each phase? What do you see as the potential problems? How would you plan to address those problems if they arise?

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.