What category information is collected by the site

Assignment Help Computer Network Security
Reference no: EM13316877

Background:

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary. Social media is becoming a rich source of information and Facebook is one example of such website which collects stores and processes information.

Task:

Your task is to identify the information collected via Facebook and investigate what uses Facebook makes of this information. You may undertake this by identifying what information sites consider private or confidential by default, the wording of the privacy policies (what they allow for and prevent) what may be restricted, and what a user has control over.

You must then develop a report including the following topics:

  • What information is required to setup a new account?
  • What category information is collected by the site
  • What are the default privacy settings
  • Do the default settings allow for maximum privacy? Explain how these default settings have an impact on privacy.
  • Recommendations to ensure maximum privacy settings are enabled
  • A critique of the privacy policy

 

Reference no: EM13316877

Questions Cloud

What is the range of values of a for which the body moves : The motion is described by the second Newton's law: m(d^2y/dt^2) + a(dy/dt) + ky = 0 where y is the body displacement in m, t is the time in s, a > 0 is the friction coeffcient in kg/s and k is the spring constant in kg/s2.
Calculate the water pressure on the second floor : The water pressure in the pipes in the basement of a tall house is 5.1 105 Pa. Calculate the water pressure on the second floor
Determine the reaction rate constant to be first order : A reaction in a batch system is assumed to be first order. Data listed below was collected. Determine the reaction rate constant. chemical concentration (ug/L) time(min) 19.3 6
Find the change in mechanical energy of the elevator : 2000 kg elevator is accelerated uniformly from rest to 4 m/s in a time of 90s. find the change in mechanical energy of the elevator
What category information is collected by the site : Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary.
How long will it take for concentration to be one-quarter : A batch system is assumed to be first order. The initial concentration is 225 mg/L. If the reaction rate constant is 0.65 hr^-1, how long will it take for the concentration to be one-quarter the starting concentration
What is the electric potential energy of the center electron : Three electrons are aligned on a straight line and separations between them are 1.0mm. What is the electric potential energy of the center electron
Define will a precipiate be consumed or produced at ph : The concentration of cadmium ion (Cd^+2) in water is 225 mg/L. Will a precipiate be consumed or produced at pH 9.0? Will a precipitate be consumed or produced at pH 7.5
What is the total charge in entropy of the mixture : Suppose 1.00kg of water at 100 degrees Celsius is mixed with 1.00kg of water at 0 degrees Celsius. What is the total charge in entropy of the mixture

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Potential threats to a bank using mobile technology

Your goal is to identify the potential threats to a bank using mobile technology and rank them in terms of risk. To calculate risk, you will need to rank each threat in terms of severity and likelihood- ITECH3215-7215

  Eulers theorem problem

Any cipher system that needs to avoid encrypting certain messages should be avoided like the plague - what do you have to say for yoursel

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  Network engineer, you are presented

As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..

  What is meant by multi-modal biometrics for access control

What is meant by "Multi-modal Biometrics" for access control. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics

  Explain problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. Solve problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd