Examine the risks and vulnerabilities

Assignment Help Computer Networking
Reference no: EM13895834

Social networks afford individuals the venue and technology to connect with many "friends", both known and unknown. An individual's activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employee's employer, such as LinkedIn.

Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.

Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:

1. Select and describe three (3) social networking sites you are presenting in the context of cloud computing.

2. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.

3. Summarize the mitigating strategies you would recommend to your CEO that affirm the organization's privacy and security practice among social network sites.

4. Suggest three (3) ways that your social network policy can protect your employer against:

a. identity theft

b. cybercrimes

c. abusive marketing

5. Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Compare and contrast private with public clouds.

• Summarize business applications that can migrate to the cloud.

• Use technology and information resources to research issues in cloud computing environments.

• Write clearly and concisely about cloud & virtual computing topics using proper writing mechanics and technical style conventions.

 

Reference no: EM13895834

Questions Cloud

What are some arguments for rousseau''s theories : What are some arguments for/against Rousseau's theories? and What is the general idea Rousseau is portraying?
About the likely net benefits of the proposed plan for home : Brunner and coauthors (2001) studied home ownership and median incomes in different California communities and their connection with voting on a proposal to promote school choice. What does this fact suggest about the likely net benefits of the propo..
Weighted average cost of capital for amazon : WEIGHTED AVERAGE COST OF CAPITAL  for Amazon (WACC) with financial statements, details of cost of capital and valuation calculations, table summarizing the inputs and assumptions used for estimating WACC Estimate the components of the cost of capital..
Give two examples of possible net surpluses : Give two examples of possible net surpluses that three voters get from two possible political alternatives A and B. Construct your first example so that the alternative that wins a majority vote generates the maximum total net surplus. Make your seco..
Examine the risks and vulnerabilities : Examine the risks and vulnerabilities
Some of positive and negative aspects of technology growth : What are some of the positive and negative aspects of technology growth? What can businesses and governments do, as they tried to do in Ohio, to make “transition” as smooth as possible?
Transaction interest rate-what is amount of first payment : Electric Company is considering the purchase of a hillside ranch for possible use as a windmill farm sometime in the future. The owner of the 500-acre ranch will sell for $3,000 per acre if the company will pay her in two payments - one payment now a..
Cause of the changes in each nation : Explain the cause of these changes in each nation, including the conditions that led to both the American and French revolutions and possible reasons for the very different outcomes in the revolutions.
Way to measure it value is by using financial metrics : way to measure IT value is by using financial metrics

Reviews

Write a Review

Computer Networking Questions & Answers

  In windows server 2008 terminal services comprise many new

in windows server 2008 terminal services include many new and important features such as ts gateway remoteapp and ts

  Set up a small network with network

Required to set up a small network with network ID: 210.15.5.96/27. In this network, there are three routers, two servers, one acting as DHCP Server and another as Mail/DNS Server.

  A let deskp denote the des encryption of the plain text p

a let deskp denote the des encryption of the plain text p by the key k.i if we set k to be the key consisting of all

  Advantages and disadvantages of deploying a wlan

discussing the advantages and disadvantages of deploying a WLAN in an organization. Compare the benefits and risks of three security methods, then identify and justify the best approach for securing a WLAN

  Explain briefly how the polling mechanism will work

What do you think is the "traffic demand information" in this research i.e. what metric is used for traffic demand information and explain briefly how the "polling mechanism" will work to distribute the traffic demand information in this research?

  1 this question relates to section 2 genetic algorithma

1. this question relates to section 2 genetic algorithma heredna -gt channel assigned to a wireless linkindividual -gt

  Design-program and implement pcs system

You are hired to design, program and implement the PCS system which management calls the Sales and Inventory Management System.

  Describe ah tunnel between gateways-using esp-transport mode

Packets based on packet header. Describe the rationale for having AH tunnel between gateways and using ESP in transport mode between two hosts.

  Describe how protocols make sure services running on device

Describe how protocols make sure services running on one type of device can send to and get data from many different network devices.

  What is the time spent in the listening

What is the time spent in the listening and learning states called? The time between each BPDU sent on a port is called which of the following

  Develop an implementation plan for cloud deployment

Develop an implementation plan for cloud deployment of the passenger reservation system. You must address the following specific deliverables for the cloud-based passenger reservation system.

  Describe the merits and demerits of using this protocol or

write 400-600 wordsuse the library and internet to search for information about network communication protocols and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd