Information has many facets value confidentiality integrity

Assignment Help Computer Engineering
Reference no: EM13379947

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary. Social media is becoming a rich source of information and Facebook is one example of such website which collects stores and processes information.

Task:

Your task is to identify the information collected via Facebook and investigate what uses Facebook makes of this information. You may undertake this by identifying what information sites consider private or confidential by default, the wording of the privacy policies (what they allow for and prevent) what may be restricted, and what a user has control over.

You must then develop a report including the following topics:

  • What information is required to setup a new account?
  • What category information is collected by the site
  • What are the default privacy settings
  • Do the default settings allow for maximum privacy? Explain how these default settings have an impact on privacy.
  • Recommendations to ensure maximum privacy settings are enabled
  • A critique of the privacy policy

Reference no: EM13379947

Questions Cloud

Problemconsider the following schema of ra b c d with : problemconsider the following schema of ra b c d with functional dependenciesa -gt b b-gt c and b-gtd1- compute the
Imagine you are the project manager for a critical project : imagine you are the project manager for a critical project for an organization. the organization wants to implement an
Assessment taskwrite a java application that calculates : assessment taskwrite a java application that calculates and displays the property tax for n property owners. n
Assignment on mirror mirror on the ceiling flexible : assignment on mirror mirror on the ceiling flexible wireless links for the data center.please answer the following
Information has many facets value confidentiality integrity : information has many facets value confidentiality integrity privacy legality and so on. all information is not the same
Section 1 aims objectives and possible outcomesprovide : section 1 aims objectives and possible outcomes.provide a clear statement of the aims and objectives of the data
You are a consultant for being brought in by xumuc to : you are a consultant for being brought in by xumuc to assist with a merger with another company.backgroundxumuc is has
Describe the security features available on a platform of : ? describe the security features available on a platform of your choice for example linuxandroidmac os
Write a 2 page research paper on the turing and von neumann : write a 2 page research paper on the turing and von neumann models. compare and contrast each and discuss which model

Reviews

Write a Review

Computer Engineering Questions & Answers

  Transmitting message and tentative checkpoint

Is node P allowed to transmit the messages related to application (as opposed to message which is part of checkpoint algorithm itself) immediately after having taken a tentative checkpoint?

  Program that prints to screen results of dividing 23 by 5

create a program, using C++ that prints to screen the results of dividing 23 by 5, where 23 and 5 are ints. Provide the results of what was printed to screen via comments in the program ; need in hardcopy.

  Factors in selecting suitable data type

Explain the factors in selecting the suitable data type for some value? Which of these is most significant?

  Compute and print the average power output

Compute and print the average power output over this 10-week period. Print the number of days with greater-than-average power output.Also print the day of the week and the number of the week on which the output is greater-than-average.

  Design an application that declares a purchase object

as you prompt for a sale amount, do not proceed until the user has entered a nonnegative value. After a valid urchase object has been created, display the objects invice number, sale amount, and sales tax.

  Exploring substantial component of information security

Explain the weaknesses in the controls? Specify whether there exist any new or upgraded access controls being considered? Let us explore this substantial component of the information security.

  Cloud to provide crm installations

What "Cloud" can provide to the CRM installations in order to ease the adoption of such systems?

  Make a gui that will create the objects

sketch a GUI that will create the objects and provide access to each object's processing methods.

  What is the largest positive number you can represent

With this number of bits, what is the largest unsigned number you can represent? (Please give answer in both decimal and binary).

  Question 2 consider the sample space s a b c d and a

question 2 consider the sample space s a b c d and a probability function pr s mdashgt ir on s. define the events a a

  Program can be used with a video rental business

Extend above with a Rental class. This class must store a Movie that is rented, an integer representing the ID of the customer who rented the movie, and an integer indicating how many days late the movie is.

  Questiongiven directed network g n a with arc lengths cij

questiongiven directed network g n a with arc lengths cij. let dij be the shortest path distances between the pair ij.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd