Evaluate the process of joining a discussion forum group

Assignment Help Management Information Sys
Reference no: EM132240317

Objective: The goal is to evaluate the process of joining a discussion forum group to analyze their "access controls."

Please note:

Do not use your primary, personal email address to sign up for the forum you select for this exercise. It is a good idea to have a secondary email address that can be used for this type of testing.

Finally, please make sure that your virus and malware protection is up to date before you start this Exercise.

Tools required to complete Exercise: Internet Browser and search engine of your choice.

Suggested browsers: Chrome, IE, & Firefox

Suggested search Engines: Yahoo, Bing, Google, & Duckduckgo

Directions: Please read all directions prior to starting this exercise.

Using your favorite search engine, type in one of the following search requests:

forum best video card

forum parenting tips

forum best hikes

(Alternatively, you can choose something in which you are very interested and on which you might want some additional insights.) Once you've located an acceptable forum, please go to the folder or "thread" where other users are discussing your selected topic.

Make sure you are on a forum that asks you to "join" or "register" before you can create new posts or respond to posts created by other users.

Pay close attention to the forum's registration process. The steps below will help you chronicle your experience of gaining access to the forum. Note: You will be required to take screen shots for several of the steps below.

Create a Word doc. In the document, briefly state the topic you selected for your search and why you selected that topic. Then, provide the EXACT web address of the forum where you registered to post.

Briefly describe the forum as well as the types of discussions/questions being asked by the other users.

Take screen shots of the verification process and paste the screen shots into your document. Did it have CAPTCHA? Did it require two-factor identification? Do not proceed if you are not comfortable with sharing the information the site is asking you to provide. If this occurs, please select another topic/forum.

Locate the End User License Agreement (EULA) on your selected forum and paste it in the document. This is the legal document to which you are agreeing when you join. You can read it in all cases, and in some cases you can also download it. In either case, make sure you include it with your submission.

Provide a brief description of all the steps your instructor or a fellow student would need to take to sign up for the same forum you selected in order to gain the same posting rights that you have.

What feedback would you give to the forum's administrator to improve their access control strategy? If their access control strategy is exceptional, please explain why you feel this way.

The specific course learning outcomes associated with this assignment are:

Diagnose risk from unauthorized access to IT systems through proper testing and reporting.

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Reference no: EM132240317

Questions Cloud

Evaluate the amount of information they disclose : Evaluate the amount of information they disclose and study their usage of the site's privacy settings, potential attacks on various aspects of their privacy.
Distinguish a digital signature and a digital certificate : What is the different between a digital signature and a digital certificate? Provide examples to support your answer.
Determine possible IT gaps and improvement opportunities : ICTICT511 Match ICT needs with the strategic direction of the enterprise Assignment - Determine possible IT gaps and improvement opportunities
What critical issue in symmetric and asymmetric encryption : What critical issue in symmetric and asymmetric encryption is resolved by using a hybrid method like Diffie-Hallman?
Evaluate the process of joining a discussion forum group : Briefly describe the forum as well as the types of discussions/questions being asked by the other users.
Why you select phd in information technology : As an individual, what are your strengths and weakness and how will they impact you as a PhD student?
Write a small introduction about an it based company : List three type of threats you think the company could face or is already facing. Prioritize those threats and include an explanation.
What are the issues and root causes that necessitates : What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws.
Provide your opinion as to whether or not you agree : The use of packet sniffers by employees is forbidden in many organizations. Provide your opinion as to whether or not you agree with this policy.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd