About the threats and potential attacks of organization

Assignment Help Basic Computer Science
Reference no: EM132387259

Discussion-1 with 100 words and a reference

Social media business has increased and is being embraced by most organization from both the public and the private scectors. This is because the use of social media to do business enable the organization to promptly respond to the customers' demands, engage with the customers, enhanced the use of technology in the organization and is also an effective way to optimize and measure success through the customer feedbacks (Mutuku, 2018). The use of social media has enabled the organizations to attain new customers, provide services effectively and deliver vital information to the customers

The increased use of the mobile gadgets in the market for computing has paused a security threat to the organization. This calls for the urgent need to manage the information in the social media to meet the business needs. There are various management strategies which have evolved over time. This includes the strategy of leaving the information where it is, use of reporting, use of information as a reuse strategy, management of information for the purpose of accountability, use of broadcast systems as a way of managing information and also the information management strategy which is based on monitoring (Thomas, 2018). Use of the management strategies for business should be encouraged as it has a lot of benefits such as improved services to customers, increased information access and also enhance business decision making. Managing information will prevent the business from various risks such as information loss and access by UN authorized personnel's.

The course has helped me appreciate the use of social media in business as it can result to unlimited opportunities for the business. However, the use of social media requires some thought as well as planning to avoid risking the business. Proper and careful utilization of the online technology which are advancing daily will help in boosting the business profile, and promote the business brand (Welch, 2018). Thus social media use has its share of benefits as well as challenges which should all be considered before implementing a decision

References

Mutuku, C. (2018). Advantages and Disadvantages of Using Social Networks in Business. Munich, Germany: GRIN Verlag.

Thomas, M. (2018). FT Guide to Social Media Strategy. Upper Saddle River, NJ: FT Press.

Welch, D. (2018). Social Media Marketing 2019: Secret Strategies to Become an Influencer of Millions on Instagram, YouTube, Twitter, and Facebook While Advertising Your Personal Brand in 2018 and Beyond. Social Media Marketing 2019.

Discussion-2 with 100 words and a reference

From the information governance subject, I learned about the threats and potential attacks of an organization in a broadway. From this, I learned how to control the data and the information of an organization. Organizations should view the Principles as a map for any road that is securely winding through an operational and legal minefield that has always existed but has recently become much more treacherous. An organization that doesn't adhere to the Principles is teetering on the edge of the minefield (Smallwood, 2014). A well reasoned and validly documented retention policy leaves little room with regard to any negative speculation relevant to the deposition of a document. It will stand when tested on the anvil of judicial review.

E-discovery is defined as the pretrial legal process used to describe the method by which parties will obtain and review electronically stored information. The 2006 Federal Rules of Civil Procedure (FRCP) served to place electronically stored information (ESI) on equal footing with paper documents in the eyes of the court. Automation is a key factor to help to set you up for success in the new world of records management (Smallwood, 2014). We can create automated processes and train artificial intelligence-driven applications to help keep control of the chaos. The cyberattack is a good attack launched from 1 or more computers towards another computer, multiple computer systems or networks. Cyber assaults can be broken straight down into two broad sorts: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer's data and perhaps gain admin privileges on it.

References

Smallwood, R. F. (2014). Information Governance: Concepts, Strategies, and Best Practices. Wiley. ISBN: 9781118218303.

Reference no: EM132387259

Questions Cloud

CNCO3002 Advanced Computer Communications Assignment : CNCO3002 Advanced Computer Communications Assignment Help and Solution, Curtin University, Australia, Assignment - My Proxy Server
Security configuration and analysis : A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.
Validate the correctness of security controls : A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.
Two articles with incident when physical security failed : For this assignment, you will search the Internet and find a minimum of two articles with an incident when physical security failed.
About the threats and potential attacks of organization : From the information governance subject, I learned about the threats and potential attacks of an organization in a broadway.
Create system diagram illustrating the equipment : Create a system diagram illustrating the equipment and connections required for project. Distinguish between non-functional and functional requirements.
Immigration Appeal Division and Immigration Division Problem : Writing a memorandum of fact and law for hearings before the Immigration Appeal Division and Immigration Division. Summarize the relevant facts
Find article on internet outline security breach : Find article on internet outline security breach or cyberattack. Provide a link to the article and suggest control that would mitigate against that that attack.
Investigate the income inequality in US : Investigate the income inequality in US. Discuss few factors that have contributed to the income inequality in US for past few decades

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd