What category information is collected by the site
Course:- Computer Network Security
Reference No.:- EM13316877

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security


Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary. Social media is becoming a rich source of information and Facebook is one example of such website which collects stores and processes information.


Your task is to identify the information collected via Facebook and investigate what uses Facebook makes of this information. You may undertake this by identifying what information sites consider private or confidential by default, the wording of the privacy policies (what they allow for and prevent) what may be restricted, and what a user has control over.

You must then develop a report including the following topics:

  • What information is required to setup a new account?
  • What category information is collected by the site
  • What are the default privacy settings
  • Do the default settings allow for maximum privacy? Explain how these default settings have an impact on privacy.
  • Recommendations to ensure maximum privacy settings are enabled
  • A critique of the privacy policy


Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more character
CHECK OUT COMPUTER ETHICS INSTITUTE'S ADVICE. The Computer Ethics Institutes Web site at www.cpsr.org/program/ethics/cei.html offers the "Ten Commandments of Computer Ethics
What steps would you advise to prevent such attacks? What limitations does this form of attack have - explain why the flag has been set and what it means for TCP connection.
The personnel manager asks you to follow up with a short paper to her briefly going over the topics you discussed. She would like the document as a memo, highlighting the subj
Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more th
Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a ra
The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers us