Evaluate the process of joining a discussion forum group

Assignment Help Management Information Sys
Reference no: EM132240317

Objective: The goal is to evaluate the process of joining a discussion forum group to analyze their "access controls."

Please note:

Do not use your primary, personal email address to sign up for the forum you select for this exercise. It is a good idea to have a secondary email address that can be used for this type of testing.

Finally, please make sure that your virus and malware protection is up to date before you start this Exercise.

Tools required to complete Exercise: Internet Browser and search engine of your choice.

Suggested browsers: Chrome, IE, & Firefox

Suggested search Engines: Yahoo, Bing, Google, & Duckduckgo

Directions: Please read all directions prior to starting this exercise.

Using your favorite search engine, type in one of the following search requests:

forum best video card

forum parenting tips

forum best hikes

(Alternatively, you can choose something in which you are very interested and on which you might want some additional insights.) Once you've located an acceptable forum, please go to the folder or "thread" where other users are discussing your selected topic.

Make sure you are on a forum that asks you to "join" or "register" before you can create new posts or respond to posts created by other users.

Pay close attention to the forum's registration process. The steps below will help you chronicle your experience of gaining access to the forum. Note: You will be required to take screen shots for several of the steps below.

Create a Word doc. In the document, briefly state the topic you selected for your search and why you selected that topic. Then, provide the EXACT web address of the forum where you registered to post.

Briefly describe the forum as well as the types of discussions/questions being asked by the other users.

Take screen shots of the verification process and paste the screen shots into your document. Did it have CAPTCHA? Did it require two-factor identification? Do not proceed if you are not comfortable with sharing the information the site is asking you to provide. If this occurs, please select another topic/forum.

Locate the End User License Agreement (EULA) on your selected forum and paste it in the document. This is the legal document to which you are agreeing when you join. You can read it in all cases, and in some cases you can also download it. In either case, make sure you include it with your submission.

Provide a brief description of all the steps your instructor or a fellow student would need to take to sign up for the same forum you selected in order to gain the same posting rights that you have.

What feedback would you give to the forum's administrator to improve their access control strategy? If their access control strategy is exceptional, please explain why you feel this way.

The specific course learning outcomes associated with this assignment are:

Diagnose risk from unauthorized access to IT systems through proper testing and reporting.

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Reference no: EM132240317

Questions Cloud

Evaluate the amount of information they disclose : Evaluate the amount of information they disclose and study their usage of the site's privacy settings, potential attacks on various aspects of their privacy.
Distinguish a digital signature and a digital certificate : What is the different between a digital signature and a digital certificate? Provide examples to support your answer.
Determine possible IT gaps and improvement opportunities : ICTICT511 Match ICT needs with the strategic direction of the enterprise Assignment - Determine possible IT gaps and improvement opportunities
What critical issue in symmetric and asymmetric encryption : What critical issue in symmetric and asymmetric encryption is resolved by using a hybrid method like Diffie-Hallman?
Evaluate the process of joining a discussion forum group : Briefly describe the forum as well as the types of discussions/questions being asked by the other users.
Why you select phd in information technology : As an individual, what are your strengths and weakness and how will they impact you as a PhD student?
Write a small introduction about an it based company : List three type of threats you think the company could face or is already facing. Prioritize those threats and include an explanation.
What are the issues and root causes that necessitates : What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws.
Provide your opinion as to whether or not you agree : The use of packet sniffers by employees is forbidden in many organizations. Provide your opinion as to whether or not you agree with this policy.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Dss model and the income and cash flow models

Scenario Manager and Goal-Seek Tools-After putting together your decision support model for Willy Wonka, you wonder if there is a more efficient way of viewing the different possible outputs of the model. You're in luck! EXCEL provides two tools..

  Develop a simulation model

develop a simulation model and simulate for one thousand hours. Report the performance measures at the current capacity and make recommendations.

  Briefly explain how it managers have to manage

Briefly explain how IT Managers have to manage in four directions - How does understanding individual personality types and communication styles

  Discuss the scope of the hit solution

Review the Final Project Scenarios in your Learning Resources and select a setting of care from one of these scenarios.

  Can standardized processes really work in a setting

As health care looks at continuous improvement (as done in manufacturing), one of the most prominent questions that has arisen is, "Can the principles that worked in manufacturing really transfer over to health care? Taking care of a patient is no..

  Question about information system managementthis solution

question about information system managementthis solution provides the learner with an explanation of the concept of

  Write a paper about business intelligence

Write a research paper in APA format on a subject of your choosing that is related to Business Intelligence. Business Uses of Natural Language Processing.

  Research internet resources for free public data

Research internet resources for free public data. In your initial post, include a hyperlink to one resource and explain why this source of data is useful for business GIS purposes.

  Provide insight into likelihood of certain threats occurring

Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of design..

  What are the various threats to information security

What are the various threats to information security in your view? Are you doing your share to protect your information? Why and why not? What can you do to improve your information security practices?

  What is a telecommunications system

What is the significance of telecommunications for organizations and society? What is a telecommunications system?

  Roles of prototyping and rapid application developmet

Discuss the roles of prototyping, rapid application development, and agile development

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd