Information has many facets value confidentiality integrity

Assignment Help Computer Engineering
Reference no: EM13379947

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary. Social media is becoming a rich source of information and Facebook is one example of such website which collects stores and processes information.

Task:

Your task is to identify the information collected via Facebook and investigate what uses Facebook makes of this information. You may undertake this by identifying what information sites consider private or confidential by default, the wording of the privacy policies (what they allow for and prevent) what may be restricted, and what a user has control over.

You must then develop a report including the following topics:

  • What information is required to setup a new account?
  • What category information is collected by the site
  • What are the default privacy settings
  • Do the default settings allow for maximum privacy? Explain how these default settings have an impact on privacy.
  • Recommendations to ensure maximum privacy settings are enabled
  • A critique of the privacy policy

Reference no: EM13379947

Questions Cloud

Problemconsider the following schema of ra b c d with : problemconsider the following schema of ra b c d with functional dependenciesa -gt b b-gt c and b-gtd1- compute the
Imagine you are the project manager for a critical project : imagine you are the project manager for a critical project for an organization. the organization wants to implement an
Assessment taskwrite a java application that calculates : assessment taskwrite a java application that calculates and displays the property tax for n property owners. n
Assignment on mirror mirror on the ceiling flexible : assignment on mirror mirror on the ceiling flexible wireless links for the data center.please answer the following
Information has many facets value confidentiality integrity : information has many facets value confidentiality integrity privacy legality and so on. all information is not the same
Section 1 aims objectives and possible outcomesprovide : section 1 aims objectives and possible outcomes.provide a clear statement of the aims and objectives of the data
You are a consultant for being brought in by xumuc to : you are a consultant for being brought in by xumuc to assist with a merger with another company.backgroundxumuc is has
Describe the security features available on a platform of : ? describe the security features available on a platform of your choice for example linuxandroidmac os
Write a 2 page research paper on the turing and von neumann : write a 2 page research paper on the turing and von neumann models. compare and contrast each and discuss which model

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd