About the threats and potential attacks of organization

Assignment Help Basic Computer Science
Reference no: EM132387259

Discussion-1 with 100 words and a reference

Social media business has increased and is being embraced by most organization from both the public and the private scectors. This is because the use of social media to do business enable the organization to promptly respond to the customers' demands, engage with the customers, enhanced the use of technology in the organization and is also an effective way to optimize and measure success through the customer feedbacks (Mutuku, 2018). The use of social media has enabled the organizations to attain new customers, provide services effectively and deliver vital information to the customers

The increased use of the mobile gadgets in the market for computing has paused a security threat to the organization. This calls for the urgent need to manage the information in the social media to meet the business needs. There are various management strategies which have evolved over time. This includes the strategy of leaving the information where it is, use of reporting, use of information as a reuse strategy, management of information for the purpose of accountability, use of broadcast systems as a way of managing information and also the information management strategy which is based on monitoring (Thomas, 2018). Use of the management strategies for business should be encouraged as it has a lot of benefits such as improved services to customers, increased information access and also enhance business decision making. Managing information will prevent the business from various risks such as information loss and access by UN authorized personnel's.

The course has helped me appreciate the use of social media in business as it can result to unlimited opportunities for the business. However, the use of social media requires some thought as well as planning to avoid risking the business. Proper and careful utilization of the online technology which are advancing daily will help in boosting the business profile, and promote the business brand (Welch, 2018). Thus social media use has its share of benefits as well as challenges which should all be considered before implementing a decision

References

Mutuku, C. (2018). Advantages and Disadvantages of Using Social Networks in Business. Munich, Germany: GRIN Verlag.

Thomas, M. (2018). FT Guide to Social Media Strategy. Upper Saddle River, NJ: FT Press.

Welch, D. (2018). Social Media Marketing 2019: Secret Strategies to Become an Influencer of Millions on Instagram, YouTube, Twitter, and Facebook While Advertising Your Personal Brand in 2018 and Beyond. Social Media Marketing 2019.

Discussion-2 with 100 words and a reference

From the information governance subject, I learned about the threats and potential attacks of an organization in a broadway. From this, I learned how to control the data and the information of an organization. Organizations should view the Principles as a map for any road that is securely winding through an operational and legal minefield that has always existed but has recently become much more treacherous. An organization that doesn't adhere to the Principles is teetering on the edge of the minefield (Smallwood, 2014). A well reasoned and validly documented retention policy leaves little room with regard to any negative speculation relevant to the deposition of a document. It will stand when tested on the anvil of judicial review.

E-discovery is defined as the pretrial legal process used to describe the method by which parties will obtain and review electronically stored information. The 2006 Federal Rules of Civil Procedure (FRCP) served to place electronically stored information (ESI) on equal footing with paper documents in the eyes of the court. Automation is a key factor to help to set you up for success in the new world of records management (Smallwood, 2014). We can create automated processes and train artificial intelligence-driven applications to help keep control of the chaos. The cyberattack is a good attack launched from 1 or more computers towards another computer, multiple computer systems or networks. Cyber assaults can be broken straight down into two broad sorts: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer's data and perhaps gain admin privileges on it.

References

Smallwood, R. F. (2014). Information Governance: Concepts, Strategies, and Best Practices. Wiley. ISBN: 9781118218303.

Reference no: EM132387259

Questions Cloud

CNCO3002 Advanced Computer Communications Assignment : CNCO3002 Advanced Computer Communications Assignment Help and Solution, Curtin University, Australia, Assignment - My Proxy Server
Security configuration and analysis : A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.
Validate the correctness of security controls : A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls.
Two articles with incident when physical security failed : For this assignment, you will search the Internet and find a minimum of two articles with an incident when physical security failed.
About the threats and potential attacks of organization : From the information governance subject, I learned about the threats and potential attacks of an organization in a broadway.
Create system diagram illustrating the equipment : Create a system diagram illustrating the equipment and connections required for project. Distinguish between non-functional and functional requirements.
Immigration Appeal Division and Immigration Division Problem : Writing a memorandum of fact and law for hearings before the Immigration Appeal Division and Immigration Division. Summarize the relevant facts
Find article on internet outline security breach : Find article on internet outline security breach or cyberattack. Provide a link to the article and suggest control that would mitigate against that that attack.
Investigate the income inequality in US : Investigate the income inequality in US. Discuss few factors that have contributed to the income inequality in US for past few decades

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What does use case mean

Q1)- What is the relationship between level 0 and level 1 DFD diagrams? Explain. Q2)- What does Use Case mean? and what does use case describe?

  Design a program using pseudocode

Design a program using pseudocode that accepts a number representing a class, and then displays the class name.

  Create an addition operator for the compound class

Create an addition operator for the compound class so that when you add two compounds, you get a new one. In the operator function, just print a string.

  What is the irr for the project

That is, it will return $2,100 at the end of the second year, $2,205 at the end of the third year and so on. What is the IRR for the project?

  Write a program to support children spelling game hangman

The traditional way to play hangman is to draw a figure on a gallows. Another part of the hanged man is added for each incorrect guess.

  Simulate a shading model

Using a 3-D modeler, print or plot pictorial wireframe views from at least three different quadrants (i.e., front/top/right side faces, back/bottom/left side faces, etc.) of models you have made.

  Difference between base and derived relation

What is the difference between base and derived relation?

  Restaurants in nyc can use in targeting customers

What are the various price discrimination strategies that restaurants in NYC can use in targeting their customers?

  Determine the profit maximization price and output

If the demand function is P(Q) = 50 -1.25Q and the Cost function C (Q) = 160 + 10 Q, where Q is the number of units in thousands and cost is in dollars.

  Improve efficiency in processing data in excel

Describe a situation in a work environment where the use of macros would improve efficiency in processing data in Excel. Identify the likely challenge(s) you would face in developing the macros, and suggest a plan for addressing the challenge.

  Raptor flowchart to display a sequence of numbers

Develop a Raptor flowchart to display a sequence of numbers from 1 to N, whereby each number in the sequence, is equal to the sum of its two immediate.

  An internet phone application generates packets

An Internet phone application generates packets

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd