Cmp71001 Cybersecurity: Issue In The Assessment Answers
Highlight at least three policies that you feel were violated in this case and address the policies that need to be in place to prevent those violations from occurring in the future. Make sure to incluce enough detail that it could be amended to an existing policy and clear enough that any/all employees know what the new policy addresses.
Explaining the three issues you want to address and why.
Write your mini-security policy following the template in textbook addressing the three issues you identified.
Files
Message Files ( Student )
- 2377579_347780329_opsectext.docx
Answer:
Purpose
This is a highly emotional issue where it is necessary to understand the different surveillance mechanism that is utilized through the National Security department. This is related to whistle-blowing act, constitutionality and ethics and the Patriot Act.
Background
This case study gives an account of Edward Snowden and focuses on cyber security work. The different steps taken and leaked NSA documents to different journalists.
Scope
The Edward Snowden is a 30 year old source that did intelligence leak in NSA and the history provides its motives and uncertainty future. This cast study provides ethical and legal framework for the actions of Edward and explains Patriot Act and questions NSA Surveillance programs (Kazan, 2016).
Guidance Sections-Three Issues
Whistle blowing-This involves the disclosure of illegality or misconduct that is taking place in a company. This simply involves the disclosure of secret information and this involves disclosure and publication for common public. According to the facts, whistleblowers will be existing within an organization and they are always under statutory or contractual requirements that is being exposed, these people are always under statutory requirement on not to reveal the information (Hadlington, 2017).
Confidentiality contracts-These contracts are regarded as a legitimate concern of any management and these are indispensable for successful operations of a company. This is true in various organizations and people can enter into any sort of confidentiality contract. These contracts will be creating ethical and legal obligations of the different parties. When an individual agrees to confidentiality, then must be agreed to keep the secret or sensitive material. This is regarded as legitimate and there is a binding contract that binds the individual to make the promise. Failure in doing so will be the breach of terms and conditions and also breach of the legal obligations (Perols & Murthy, 2018).
The unlawful contract doctrine-This has the robust and long standing in common law. This is a philosophical basis that all the contracts have been conditional property transfers. This has restricted the contract’s scope of actions and that have been consistent with the rights. The doctrine will be viewed as public policy that arises from eschew and this grant legal assistance for all the lawbreakers. This is an illegal contract and this will be unenforceable because enforcement can be injurious to the best interest of the public.
Roles and Responsibilities-Mini Security Policy
The Mini security policy is based on the non-enforcement principle and this is assaulted through the government can deem information and this will be classified. This is the declaratory act and it overrides the disclosure right for disclosing all the government unlawful activities. According to the view of government, Snowden is a criminal and deserves serious punishment. However, it settles on the fact that the government will require all the employees to agree with the condition and not to disclose the information (Tagarev, 2014).
Information and Assistance
According to the classified information, it has a small division of the legitimate restrictions. This status implies that information must be made secretly and government legitimately requires not disclosing the classified information.
Conclusion
In light of the above considerations, there is no special status granted to the document based and that is on the special privilege assertion through a given entity that is under scrutiny.
References
Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346.
Kazan, H. (2016). Contemporary Issues in Cybersecurity. Journal Of Cybersecurity Research (JCR), 1(1), 1.
Perols, R., & Murthy, U. (2018). The Impact of Cybersecurity Risk Management Examinations and Cybersecurity Incidents on Investor Perceptions. SSRN Electronic Journal.
Tagarev, T. (2014). Intelligence, Crime and Cybersecurity. Information & Security: An International Journal, 31, 05-06.
Buy Cmp71001 Cybersecurity: Issue In The Assessment Answers Online
Talk to our expert to get the help with Cmp71001 Cybersecurity: Issue In The Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.