What category information is collected by the site

Assignment Help Computer Network Security
Reference no: EM13316877

Background:

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary. Social media is becoming a rich source of information and Facebook is one example of such website which collects stores and processes information.

Task:

Your task is to identify the information collected via Facebook and investigate what uses Facebook makes of this information. You may undertake this by identifying what information sites consider private or confidential by default, the wording of the privacy policies (what they allow for and prevent) what may be restricted, and what a user has control over.

You must then develop a report including the following topics:

  • What information is required to setup a new account?
  • What category information is collected by the site
  • What are the default privacy settings
  • Do the default settings allow for maximum privacy? Explain how these default settings have an impact on privacy.
  • Recommendations to ensure maximum privacy settings are enabled
  • A critique of the privacy policy

 

Reference no: EM13316877

Questions Cloud

What is the range of values of a for which the body moves : The motion is described by the second Newton's law: m(d^2y/dt^2) + a(dy/dt) + ky = 0 where y is the body displacement in m, t is the time in s, a > 0 is the friction coeffcient in kg/s and k is the spring constant in kg/s2.
Calculate the water pressure on the second floor : The water pressure in the pipes in the basement of a tall house is 5.1 105 Pa. Calculate the water pressure on the second floor
Determine the reaction rate constant to be first order : A reaction in a batch system is assumed to be first order. Data listed below was collected. Determine the reaction rate constant. chemical concentration (ug/L) time(min) 19.3 6
Find the change in mechanical energy of the elevator : 2000 kg elevator is accelerated uniformly from rest to 4 m/s in a time of 90s. find the change in mechanical energy of the elevator
What category information is collected by the site : Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary.
How long will it take for concentration to be one-quarter : A batch system is assumed to be first order. The initial concentration is 225 mg/L. If the reaction rate constant is 0.65 hr^-1, how long will it take for the concentration to be one-quarter the starting concentration
What is the electric potential energy of the center electron : Three electrons are aligned on a straight line and separations between them are 1.0mm. What is the electric potential energy of the center electron
Define will a precipiate be consumed or produced at ph : The concentration of cadmium ion (Cd^+2) in water is 225 mg/L. Will a precipiate be consumed or produced at pH 9.0? Will a precipitate be consumed or produced at pH 7.5
What is the total charge in entropy of the mixture : Suppose 1.00kg of water at 100 degrees Celsius is mixed with 1.00kg of water at 0 degrees Celsius. What is the total charge in entropy of the mixture

Reviews

Write a Review

Computer Network Security Questions & Answers

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Write the symbolic logic for the 3des decryption

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd