CYBV329 Cyber Law, Ethics and Policy

  • Subject Code :  

    CYBV329

  • Country :  

    US

  • University :  

    The University of Arizona

Answer:-

Legal Cyber Inquiry

Today, companies are accessing internet and computing technologies that are connected with the business networks so that performance and effectiveness can be improved. However, it is difficult for companies to control and manage the security risks and threats posed by hackers. The connected internet networks and computer systems can be targeted by hackers by which the privacy of the business networks can be affected easily (Demirkan, Demirkan, & McKee, 2020). In order to control and manage the security risks and cyber-attacks posed by the hackers, it is important for the organization to include the legal cyber inquiry so that identification and detection of the cyber-attacks and threats can be done in a significant manner. Therefore, it is recommended that the organization should develop legal cyber inquiry and follow security laws so that privacy can be improved.

Incident Response Process

Incident response is a kind of process used for controlling and handling the security risks and concerns related to the business communities. The implementation of the security incident response plan can enable the organization to identify the risk factors increasing cyber-attacks and security issues in the workplace (Galinec, Možnik, & Guberina, 2017). It is recommended that the organization should develop an incident response plan that delivers a platform for protecting data against cyber-attacks where security laws and regulations should be applied. GDPR is a security regulation that enables companies to focuses on the security risks and improves the privacy of the business and private details. There are several other security laws that can be followed by the organization in order to develop effective incident response plans for example Data Protection 2020, US Privacy Act of 1974, HIPAA 1996, FISMA 2002 and many more.

Ethical Implications Made From The Christian Worldview

In this generation, the rate of cyber-security is growing rapidly where the hackers are capable to target databases and business networks and data breach-related issues can be posed easily. The collected data by the organization from customers can be hacked by the hackers through malicious codes that ethical and illegal issues can be explored (Iguer, et al., 2014). The hacked details of the organization can be used for performing illegal activities that can enhance ethical concerns in the workplace.

From the Christian worldview, protecting privacy should be considered first as the hackers are capable to target the privacy of the business networks and databases by which sensitive information can be explored. Moreover, increasing the privacy of collected data can enable the organization to manage ethical implications and social issues posed by the hackers (Kaster, & Sen, 2017). The organization should be complying with the security laws and regulations so that the development of effective security plans and policies can be completed effectively and privacy can be improved. Therefore, it is recommended that organization should first focus on protecting privacy then applies security laws and response incident plans.

References

Demirkan, S., Demirkan, I., & McKee, A. (2020). Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 7(2), 189-208.

Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 58(3), 273-286.

Iguer, H., Medromi, H., Sayouti, A., Elhasnaoui, S., & Faris, S. (2014). The impact of cyber security issues on businesses and governments: A framework for implementing a cyber security plan. In 2014 International Conference on Future Internet of Things and Cloud, 316-321.

Kaster, P., & Sen, P. P. (2017). Cybersecurity and Rural Electric Power Systems: Considering Competing Requirements for Implementing a Protection Plan. IEEE Industry Applications Magazine, 23(5), 14-20.

Are you seeking reliable essay help from academic experts in the UK? At Myassignmenthelp.co.uk, we have searched high and low to recruit the top paper writers in the UK who can provide you with the best assignment help. Most of these professionals have completed their PhDs from top universities in the UK. Therefore, they’re the best at resolving every "Who can do my assignment for me?" query.

These professionals undergo intense training to provide coursework help services within strict deadlines. Hence, you don’t have to waste precious seconds wondering, “Can your experts write my assignment within the deadline?" Instead, rest assured that our experts will consistently deliver top-quality work within the due date.

Why Student Prefer Us ?
Top quality papers

We do not compromise when it comes to maintaining high quality that our customers expect from us. Our quality assurance team keeps an eye on this matter.

100% affordable

We are the only company which offers qualitative and custom assignment writing services at low prices. Our charges will not burn your pocket.

Timely delivery

We never delay to deliver the assignments. We are very particular about this. We assure that you will receive your paper on the promised date.

Round the clock support

We assure 24/7 live support. Our customer care executives remain always online. You can call us anytime. We will resolve your issues as early as possible.

Privacy guaranteed

We assure 100% confidentiality of all your personal details. We will not share your information. You can visit our privacy policy page for more details.

Upload your Assignment and improve Your Grade

Boost Grades