Examine the risks and vulnerabilities

Assignment Help Computer Networking
Reference no: EM13895834

Social networks afford individuals the venue and technology to connect with many "friends", both known and unknown. An individual's activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employee's employer, such as LinkedIn.

Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.

Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:

1. Select and describe three (3) social networking sites you are presenting in the context of cloud computing.

2. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.

3. Summarize the mitigating strategies you would recommend to your CEO that affirm the organization's privacy and security practice among social network sites.

4. Suggest three (3) ways that your social network policy can protect your employer against:

a. identity theft

b. cybercrimes

c. abusive marketing

5. Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Compare and contrast private with public clouds.

• Summarize business applications that can migrate to the cloud.

• Use technology and information resources to research issues in cloud computing environments.

• Write clearly and concisely about cloud & virtual computing topics using proper writing mechanics and technical style conventions.

 

Reference no: EM13895834

Questions Cloud

What are some arguments for rousseau''s theories : What are some arguments for/against Rousseau's theories? and What is the general idea Rousseau is portraying?
About the likely net benefits of the proposed plan for home : Brunner and coauthors (2001) studied home ownership and median incomes in different California communities and their connection with voting on a proposal to promote school choice. What does this fact suggest about the likely net benefits of the propo..
Weighted average cost of capital for amazon : WEIGHTED AVERAGE COST OF CAPITAL  for Amazon (WACC) with financial statements, details of cost of capital and valuation calculations, table summarizing the inputs and assumptions used for estimating WACC Estimate the components of the cost of capital..
Give two examples of possible net surpluses : Give two examples of possible net surpluses that three voters get from two possible political alternatives A and B. Construct your first example so that the alternative that wins a majority vote generates the maximum total net surplus. Make your seco..
Examine the risks and vulnerabilities : Examine the risks and vulnerabilities
Some of positive and negative aspects of technology growth : What are some of the positive and negative aspects of technology growth? What can businesses and governments do, as they tried to do in Ohio, to make “transition” as smooth as possible?
Transaction interest rate-what is amount of first payment : Electric Company is considering the purchase of a hillside ranch for possible use as a windmill farm sometime in the future. The owner of the 500-acre ranch will sell for $3,000 per acre if the company will pay her in two payments - one payment now a..
Cause of the changes in each nation : Explain the cause of these changes in each nation, including the conditions that led to both the American and French revolutions and possible reasons for the very different outcomes in the revolutions.
Way to measure it value is by using financial metrics : way to measure IT value is by using financial metrics

Reviews

Write a Review

Computer Networking Questions & Answers

  Decide what you believe is the biggest ethical issue

question 1 imagine you are an entrepreneur starting a new business venture. take a position on whether or not you would

  Q1a express the shannon-hartley capacity theorem in terms

q1a express the shannon-hartley capacity theorem in terms of where is the energybit and is the psd of white

  Calculating higher data rate in atm line

Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

  Plan to provide secure access control methods

A plan to provide secure access control methods for all user access and A viable password policy, which includes complexity, duration, and history requirements

  Discuss the benefits of cloud computing at riordan

Explain the Benefits of Cloud Computing at Riordan. A full description of the new system, a description of its components, and the benefit it will provide to Riordan.

  Description of the network security

The thesis statement: following technological advancement, it is advisable to consider the new forms to manage security within possible limits

  Part-11 suppose the information content of a packet is the

part-11 suppose the information content of a packet is the bit pattern 1111 1011 1001 1100 and an even parity scheme is

  Differences between a cpe versus the hosted version of ipt

Given the migration to IPT, what are some of the differences between a CPE (IP-PBX) versus the hosted version of IPT

  Effect of data rates on each part of the network

Explain the effect of data rates on each part of the network. Describe strategies to ensure the availability of network access in switched and routed networks

  Compare and contrast the self-check-in interface

Estimate the length of time it will take to complete each stage of the management plan. Compare and contrast the self-check-in interface with the interface a receptionist would use

  Human-computer interaction layer design

Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships wit..

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd