Examine the risks and vulnerabilities

Assignment Help Computer Networking
Reference no: EM13895834

Social networks afford individuals the venue and technology to connect with many "friends", both known and unknown. An individual's activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employee's employer, such as LinkedIn.

Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.

Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:

1. Select and describe three (3) social networking sites you are presenting in the context of cloud computing.

2. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.

3. Summarize the mitigating strategies you would recommend to your CEO that affirm the organization's privacy and security practice among social network sites.

4. Suggest three (3) ways that your social network policy can protect your employer against:

a. identity theft

b. cybercrimes

c. abusive marketing

5. Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Compare and contrast private with public clouds.

• Summarize business applications that can migrate to the cloud.

• Use technology and information resources to research issues in cloud computing environments.

• Write clearly and concisely about cloud & virtual computing topics using proper writing mechanics and technical style conventions.

 

Reference no: EM13895834

Questions Cloud

What are some arguments for rousseau''s theories : What are some arguments for/against Rousseau's theories? and What is the general idea Rousseau is portraying?
About the likely net benefits of the proposed plan for home : Brunner and coauthors (2001) studied home ownership and median incomes in different California communities and their connection with voting on a proposal to promote school choice. What does this fact suggest about the likely net benefits of the propo..
Weighted average cost of capital for amazon : WEIGHTED AVERAGE COST OF CAPITAL  for Amazon (WACC) with financial statements, details of cost of capital and valuation calculations, table summarizing the inputs and assumptions used for estimating WACC Estimate the components of the cost of capital..
Give two examples of possible net surpluses : Give two examples of possible net surpluses that three voters get from two possible political alternatives A and B. Construct your first example so that the alternative that wins a majority vote generates the maximum total net surplus. Make your seco..
Examine the risks and vulnerabilities : Examine the risks and vulnerabilities
Some of positive and negative aspects of technology growth : What are some of the positive and negative aspects of technology growth? What can businesses and governments do, as they tried to do in Ohio, to make “transition” as smooth as possible?
Transaction interest rate-what is amount of first payment : Electric Company is considering the purchase of a hillside ranch for possible use as a windmill farm sometime in the future. The owner of the 500-acre ranch will sell for $3,000 per acre if the company will pay her in two payments - one payment now a..
Cause of the changes in each nation : Explain the cause of these changes in each nation, including the conditions that led to both the American and French revolutions and possible reasons for the very different outcomes in the revolutions.
Way to measure it value is by using financial metrics : way to measure IT value is by using financial metrics

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe mechanism used for signaling between client-server

Describe the mechanism used for signaling between client and server to indicate that persistent connection is being closed. Can client, server, or both signal close of connection?

  Software development methods comprise joint application

software development methods include joint application development jad rapid application development rad extreme

  What is the purpose of our dropping the transmit power

In your opinion, what is the purpose of our dropping the transmit power to such a low level? What do access point connectivity statistics collected for the roaming station show

  Types of cable connection of bank network

Even though the loading dock is nowhere near the shop floor, the dock is 1100 feet from the front office. What types of cable will work to make this connection? Choose the best medium for this project.

  Explain standard analog-to-digital sampling rate

What is the bandwidth required (in bps) if synchronous time division multiplexing is used, along with the standard analog-to-digital sampling rate, and each sample is converted into an 8-bit value?

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Find all irreducible polynomials

Find all irreducible polynomials

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Make a program which manages a registry of compact discs

make a program that manages a registry of compact discs cds. the register may e.g. based on a doubly linked list

  Question 1nbspnbspnbsp what rc4 key value will completely

question 1.nbspnbspnbsp what rc4 key value will completely invert s after the initial permutation so that s0 255 s1

  Will server core be used on any servers

How many total servers are needed? Which roles will be combined? What edition of Windows will be used for each server (e.g., Standard, Datacenter)? Will Server Core be used on any servers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd