Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Review the journal article, What We Talk About When We Talk About “Reasonable Cybersecurity”, by Kevin L. Miller. The essay should reflect your understanding of your textbook readings and the journal
Review the journal article, What We Talk About When We Talk About “Reasonable Cybersecurity”, by Kevin L. Miller. The essay should reflect your understanding of your textbook readings and the journal article. You are free to use any other relevant references beyond the prescribed texts. Summarize the article’s main points, and answer the following questions.
- What are the difficulties that organizations will face with the authors recommendations?
- How can this information be used to improve the risk management of an organization and the organization's security program in general?
- Do you agree or disagree with the author's viewpoint and why?
- The paper is to be 2,000 words in length, current APA style, excluding the title and references page.
- Support your answers with at least 3 references. They should be published within the last five years, scholarly journal articles or primary legal sources (statutes, court opinions).
- This assignment may NOT contain more than 20% of its content quoted from another source.
No plagiarism, will be submitted on Turnitin.
Link to article is https://cdn.inst-fs-iad-prod.inscloudgate.net/66964867-8a56-4706-be27-c9d42e20a296/What%20we%20talk%20about%20when%20we%20talk%20about%20reasonable%20cybersecurity.pdf?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii82Njk2NDg2Ny04YTU2LTQ3MDYtYmUyNy1jOWQ0MmUyMGEyOTYvV2hhdCUyMHdlJTIwdGFsayUyMGFib3V0JTIwd2hlbiUyMHdlJTIwdGFsayUyMGFib3V0JTIwcmVhc29uYWJsZSUyMGN5YmVyc2VjdXJpdHkucGRmIiwidGVuYW50IjoiY2FudmFzIiwidXNlcl9pZCI6IjEwNjg1MDAwMDAwMDA0MzM3MCIsImlhdCI6MTc2MzAyODE5NiwiZXhwIjoxNzYzMTE0NTk2fQ.k-HI67xhWRnWhN_fuAE41bNZzLa-ebV0_GBIvls2hKHZLWsvxKn6gu5cxo-RLvNc_d9Gron3I5krNLonmbufEQ&download=1&content_type=application%2Fpdf
- @
- 12 orders completed
- ANSWER
-
Tutor has posted answer for $30.00. See answer's preview
******* We Talk ***** When We **** ***** ‘Reasonable Cybersecurity’” ***** L Miller Student’s ***************** ************************ ********** NameDue ************* ** Talk ***** **** ** **** ***** ************* ******************* ***** * *********** * Miller’s journal ******* ** ***** expansive ** the **** ****** **** ***** **** organizations **** it ***** ** ********** ************* issues ** ******* ** **** ***** **** ** **** ***** ************* Cybersecurity’” Kevin L ****** **** *** 2015 ***** breach ** * **** study ** interrogate *** the *** defines “reasonable” ********** ** ******** **** *** what organisations **** ** to **** **** ******** His ******* ******** ** ****** ************* ****** ** ********* ************* **** ***** proactive ********* *** **************** processes that ***** ******** **** *** ****** ** ******* *** ******** ********* ***** *** **** ** *** main ****** **** the ******* *** addressed Cybersecurity issues *** ******** **** ****** ** routine **** they *** ********* ** *********** institutions ****** uses the 2015 **** ***** ***** ** a **** ******* ***** the *** defines **************** ********* when ** comes ** data ********** *** ***** ******* ** organizational ********** ********** *** ************ **** **** **** people’s **** and personal informationThe ****** ***** ****** ******** ******* recommendations that ************* should ******** *** while **** do ** there *** ********** **** **** ***** **** ** *** process **** ** *** ********** ******* resource *********** **** ** * ***** ******* *** ******* organizations ******* **** might have ***** ********* and * ******* ****** They ***** **** lack ****** ************* ******** ******* of the limited resources that they can use to build *** ******* * ************* ******** posture ** ** ******* that organizations ******* **** * minimal ****** *** ***** resources ************ ************* ******** ***** become * challenge **** notwithstanding *** could ***** **** ************* could scale ** ***** ** *** ********** approach **** ***** **** *** **** ***** be ************* to * ******** ****** than ** ***** ** to ******* ****** **** ***** be ****** ***** this is ** ***** ** **** *** **** *** ********* ** resource *********** as * **************** challenge **** organizations ***** ********** ** *** ambiguity of the “reasonable” ******** This is a term **** ** *** clearly *** ******** defined ** **** ********* ************* **** ************* about **** will **** as ***** ** ********** ********** ******* ***** ***** * ********* **** is ******** ** *** *** *** “reasonable” ******** ** ***** defined ** a ************ ***** **** ***** **** ***** ** ** ******** standard **** ******* the appropriate ********** and ************* ** **** *********** It could be **** *************** with **** other ***** **** confusion could be *********** *** ************* that ******* within *** **** parameter metrics ************* might ** ********* ***** *** ** the ****** **** *** *** ** compliant ** ******** ***** are ******* ********** ************** ******* ****** **** ******** is *** ******* ***** loopholes ** **** mechanics **** state ***** have **** **** ****** ********** ********* *********** ** **** regard ** ******* * ******* ** ***** US expectations **** global ********** **** **** ********* ** ****** *** ********** *********** *** ************* ** *** ****** States ** ************ ** ********** *** ********* jurisdiction to pursue "unfair ** ********* ********** ******* ************* that ****** ************ ***** ******** ******* or fail ** ******* * ***** ******** of ********** **** the ******* Trade ********** (FTC) *** ****** *** de ***** national ************* regulator *** *** *** ************ *********** baseline ********* *** ******** ********** ******* **** **** *** *********** ******** ********* **** organizations might ******** ** **** ** **** the threat ** rapidly evolving Miller ********* *** ** adaptive ******** ** **** **** *** changes that *** ************* **** is based on the ********** that ************* can ******* adapt to the situation ** ** ***** **** **** **** The ********* here lies ** *** *** attack ******* ***** are ******** instances in which ************* can ** ******** *** ************* **** to ** ready to ****** *** ******** ** ******* **** **** ********** ** **** ******** *** ********** frameworks *** developed ** **** **** *** *** threat **** ******* a ********* because ************* have to use resources ** deal with *** ***** ** hand *** ***** become *** **** *** ************* ** ****** because ****** ** later *** organization ***** ***** to experience ******** *************** *** ** some ****** new **** ********* are *********************** ******* is ******* ****** **** ********** *** **** ****** ** ******* This can be ** ********** **** it comes ** adopting *** *********** *** ******** designs In **** ********* ************* ***** *** siloed ****** the ** frameworks ** ** ************** ******* They *** only ******* ** ***** ***** when *** ***** is ******** *** **** *** ****** ** ****** ** ** emergency In ******** legal *** ********** *** ***** ******** ** satisfying ******* regulatory ************ **** ** **** ******* considering the broader **** ********** **** ignoring *** neglecting compliance issues **** becomes * ********* because * ******** **** *** *** ***** regulatory frameworks ** *********** ** the ******* and ****** ** *** ********* ***** ********** ***** acknowledge *** ********** ** ****** cybersecurity measures ************** culture *** inertia *** ******* **** it ******** ** ******* difficult *** *** ************ ** adopt *** **************** ******** of *************** ******* on **** ************ ** ** aspect ** ************* ***** **************** ******** **** ** ******* * challenge **** many ************* ***** face ** **** ******** to ****** their mission This is because many ************* and *** ******* *********** require **** *********** **** *********** ** ** *** form ** data ****** ******** ****** rely ******* ** **** ********* *** consumer ********* **** allows *** user to **** a better ************* ** their ****** base *** ******** ********* **** ******** firms will ********** data as a strategic ***** ********** ***** ************* and businesses **** **** **** to minimize data storage *** requisition ***** ****** *********** **** ***** *** see **** ** a ********* because **** *** ** as a ******** ******** and limiting **** ****** is *** ** *** things that ***** ************ might *** agree ** because ** *********** their belief **** **** **** ** ********* ** *********** ********************** *** numerous ********** ****** above ***** are **** * fair number ** recommendations **** *** enhance ************** risk management *** ** the *************** is that ************* ****** ** ******** ** *** ********* ******** ** *** ************ **** ** ** important aspect because it ***** it will ** part ** *** ************** ********** risk governance ****** than ***** ** ******** risk mitigation ****** *** ********* ******** ***** **** ***** ********** ****** the **************** ********* plan ** ******* *** allows *** *************** ********* ******* ******* *********** supply ***** operations and **** ********** **** there ** alignment various ***** such ** **** ******** are mitigated *** ********* *** ******** *** reduced ** addition **** **** **** ******* ******** ************ *** ***** *** ******* *********** *********** ********* ******** ******* is ******* recommendation that **** help ******* ************* **** ********** This ***** **** ********** ** ************* need ** ** ********* when ********** ************* ***** *** *************** **** ***** that they *** detect ******* ***** early and ****** to them before they can be ********* **** can **** ** ****** ** good-faith ** ********** ******* **** *** ** ****** **** organizations ** handle the ***** associated **** ******* **** *** ********** systems *** operations **** ****** ** good ***** *** be seen ** * ***** ** ********** ****** and the reduction of ********* **** **** **** ** ***** ******** ********* usually **** ******* organizations **** are ***** ** showcase ************ *** accountability **** ** ***** ** data ************ This becomes their *********** **** over ***** ************* that are *** data ********* ** **** instances ***** ********** scrutinize ************* practices during ***** *** ********* ********* ***** ************* ********** ** tangible business ********** ********* ********** ********** ******** *** viewpoint * *** quite ***** ** **** ** **** *** **** he ********* *** in ***** instances *** ******** is ********** and ***** correct ******* ** ***** * **** ***** of ******** particularly *** **** VTech **** *** ***** ** **** ******** ************* measures *** ************ ***** *** need *** ********** ************* ******** ** ** ******* ** ****** that ***** ******** are ***** with or ********* *** ***** **** ***** ***** not ** * ********** case ***** are numerous ******** **** breaches *** ********* ***** ************* overlook *************** ** **** ********* they fail to ******* *** ********* **** ********* *** *** ** ****** *** ***** for ***** *********** Miller is ***** ** ****** **** organizations should ***** * ****** **** ******** ** ***** ********** ***** ********* *** ******* *********** ** ******* global bodies **** enhance data safety ***** ** ********* *** **** ************ I find ** ********* **** is ******* ** the numerous data ******** that ** have **** happening *** the ************ ***** breaches have *** on ********** ************ ** ******* ******** Miller ******** ground for reasoning ***** he ******** ********* *** recommendations *** such ***** ****** ****** **** ************* *** ** ** ***** **** they ignore ******** **** ********* ******** best ********* **** ************* **** ** ** date **** ****** ** ************* ** is evident that most if *** all ************* hold/host people’s **** **** **** is used for ******** ** gauge ******* ******* ** *** ******** **** **** ** *** **** ** is ******* ********* for *** ******** to **** ******** ** ***** ** ******* ******** ** people’s **** **** data ** **** ** shared without ******* there is * **** of ***** *** credibility **** ** *** ********* will **** *** find *********** ********** that **** store ***** **** ** *** long *** ****** is right ** advocate for **** ************ **** ***** ** * standard ******** to ********* ethical ********** **** ******** ******** *********** ***** recommendations *** ***** ********** are ***** *** ******* * ******* ****** ** ** the ***** ********** for a **************** cybersecurity approach ***** *** term ********** ** *** *** ******* *** ******** defined ***** ** * **** to **** better ways ** **** **** ******** dataWhile * quite ***** **** **** ** ********** ************ ***** ** * ****** ***** ***** I diverge **** *** ********* Miller’s ********** is **** all organizations can feasibly adopt *** **** ******** ** *************** *** **** ********* **** he *** ******** *** implicit ********** ** that **** ***** organizations **** resource constraints **** ***** be **** ** *** **** core ******* this ****** ** ****** resolved ** *********** *** ********** ** ************* **** ** *** frameworks are ********* *** are ******** ** *********** ************* ******* *********** ********** ******** ********* ******* *** ********** frameworks **** *** ******** ** ***** ***** *** ******* **** *** ***** describe “reasonable **************** ** ******* ** *********** *********** **** ***** firm *** ******** ******* *** ******** ************* ********* **** ** *** ** ****** *** **** **** **** ************ are ***** ** ignore **** of the ******* ******* *** ******** **** practices as ******* ********* ** ****** ***** ** ***** **** happens **** *************** ** a ****** of ********* *** emphasis to ***** ************** models **** ************** **** *** ***** ** firms ** ***** ***** ********** ******** remains ** ** with ***** *************** or **** ********** article provides a ********* ****** ***** ************* should ****** *** **** ** ***** ** be “reasonably **************** *** ******* **** provides a roadmap ** *** an ***** ************ ****** ** ** *** ******* ******* of **** and ******* Miller explains that *************** approaches do *** **** ** effortlessly ** **** ****** ******* ** ******** ****** that ***** *** ******* asserts *** **** *** ********* ********** **** **** **** alleviate the ****** *** **** breaches ****** **** even ****** While ***** ********* *** ******** *** the **** processes ** deal **** **** breaches **** ** **** **** * **** ***** ** ********** **** ** ***** ********** ******* limited ********* ***** ******** *** *********** ********** ***** are **** of *** ******* **** *** ******* when ** comes ** ******** *** **** ********* ** the industry ** **** ** **** * ***** ***** with ********** ********* and the ******** he *** ******** ** ******* *** ******** He emphasizes **** ************ ** **** data breach ***** *** this ** ********* ***** ******* * ******** ******** with *** ******** ******** ** ******** **** ** the ******** ******* limited ********* Miller’s argument ****** **** the ********** of ************* governance ******** *** ****** * ********* ******* *** ************* ******* ** navigate ** ************ complex ******* ****************************** for ********* ******** ************** ************* * CISA **** Cybersecurity and Infrastructure ******** Agency CISAhttps://wwwcisagov/resources-tools/resources/framework-improving-critical-infrastructure-cybersecurityRiosG ****** ********** *** Intersection ** ********** and Vulnerability: *** ******** ********* of Cybersecurity ** ********** ********** *** *** ********** for ************* ****************** University ******* of *** *** *************** 155-156https://scholarshiplawedu/cgi/viewcontentcgi?article=1168&context=jltSangfor ************ (2023 ***** 20)Comparing proactive vs ******** ************* ** ************************************************************************************* ******** ******** fail ** ******* consumers with information ** *** **** ********* **** provide ******** updates ***** ******** 26) ******* ***** *************************************************************************************************************************************************************************
