What category information is collected by the site
Course:- Computer Network Security
Reference No.:- EM13316877

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security


Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary. Social media is becoming a rich source of information and Facebook is one example of such website which collects stores and processes information.


Your task is to identify the information collected via Facebook and investigate what uses Facebook makes of this information. You may undertake this by identifying what information sites consider private or confidential by default, the wording of the privacy policies (what they allow for and prevent) what may be restricted, and what a user has control over.

You must then develop a report including the following topics:

  • What information is required to setup a new account?
  • What category information is collected by the site
  • What are the default privacy settings
  • Do the default settings allow for maximum privacy? Explain how these default settings have an impact on privacy.
  • Recommendations to ensure maximum privacy settings are enabled
  • A critique of the privacy policy


Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and
Describe the major privacy issues facing organizations today. Analyze the major privacy issues described above and compare that to the potential privacy risks facing the spo
Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the ri
so far this week we have discussed three types of security: retail, institutional, and industrial. I think that there is a little bit of confusion still about what the diff
Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be intro
1. What was the main difference between 1G and 2G cellular systems? 2. Discuss the technological evolution from circuit switching to packet switching in cellular telephony.
Countermeasures to consider for your responses: Fix known exploitable software flaws Develop and enforce operational procedures and access controls (data and system) Provide
MN603 Wireless Networks and Security Assignment. Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the b