{"id":31365,"date":"2024-08-22T17:57:08","date_gmt":"2024-08-22T17:57:08","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/law-770-704-week-1-discussion-cybersecurity-recognition-vs-plans-vs-actions\/"},"modified":"2024-08-22T17:57:08","modified_gmt":"2024-08-22T17:57:08","slug":"law-770-704-week-1-discussion-cybersecurity-recognition-vs-plans-vs-actions","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/law-770-704-week-1-discussion-cybersecurity-recognition-vs-plans-vs-actions\/","title":{"rendered":"LAW 770 704: Week 1 Discussion: Cybersecurity: Recognition vs. Plans vs. Actions"},"content":{"rendered":"<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">One conceptual model for cybersecurity suggests that an organization must go through&nbsp;<\/span><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">four phases in dealing with cybersecurity.<\/span><\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\" aria-level=\"1\"><span style=\"cursor: auto; color: inherit;\">First, the organization has to acknowledge that the risk is there, that it is real, and that it affects the particular organization.&nbsp;<\/span><i style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">(Acknowledge\/Assess Risks and Outline Solutions.)<\/span><\/i><\/li>\n<li style=\"cursor: auto; color: inherit;\" aria-level=\"1\"><span style=\"cursor: auto; color: inherit;\">Second, resources must be provided to develop standards and procedures for a commercially reasonable&nbsp;cybersecurity&nbsp;program.&nbsp;<\/span><i style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">(Develop the Program)<\/span><\/i><\/li>\n<li style=\"cursor: auto; color: inherit;\" aria-level=\"1\"><span style=\"cursor: auto; color: inherit;\">Third, based on the standards and procedures you&#8217;ve built, you have to be certain that they have actually been implemented.&nbsp;<\/span><i style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">(Implement and Audit the Program)<\/span><\/i><\/li>\n<li style=\"cursor: auto; color: inherit;\" aria-level=\"1\"><span style=\"cursor: auto; color: inherit;\">Finally, based on monitoring the technology environment and the organization&#8217;s particular need, the organization has to update its&nbsp;cybersecurity&nbsp;as threats\/risks are recognized and as the organization evolves its business models.&nbsp;<\/span><i style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">(Monitor the Environment and Apply Lessons Learned)<\/span><\/i><\/li>\n<li style=\"cursor: auto; color: inherit;\" aria-level=\"1\"><i style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">https:\/\/www.ibm.com\/topics\/data-breach<br \/><\/span><\/i><\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Does this model seem reasonable to you? Why or why not? What do you see as practical steps for each phase? What do you see as the potential problems? How would you plan to address those problems if they arise?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One conceptual model for cybersecurity suggests that an organization must go through&nbsp; four phases in dealing with cybersecurity. First, the organization has to acknowledge that the risk is there, that it is real, and that it affects the particular organization.&nbsp;(Acknowledge\/Assess Risks and Outline Solutions.) Second, resources must be provided to develop standards and procedures for [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[74],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31365"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=31365"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31365\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=31365"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=31365"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=31365"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=31365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}