What are the companys key assets

Assignment Help Computer Engineering
Reference no: EM133244642

Company overview:

Fledgling social media platform, 'Chatter' launched in September 2017. Its main users are 13-21 year olds. Users can:

? Share photos and post status updates

? Send messages via a private chat

? Play games with other users, and make in-app purchases

Their head office is in Birmingham, and they employ 30 people. All staff members have a staff pass to enter the building, and have a company iPhone and laptop. All staff have received an email outlining the best practice for cyber security but this was not read by everyone and staff have not undertaken any mandatory training.

On an individual level, cyber security is about the individual users' personal protection. For example, sharing and tagging pictures is a personal cyber risk for an individual as they are revealing personal information. These are important to consider as individual users, however, for this task, bear in mind that PwC is advising Chatter on risks to its business. This could certainly be influenced by user's personal cyber security risks but try to consider the risks to the business' security as a whole such as the personal data Chatter collects and how they store it is. Keep this in your mind throughout the task.

Question 1: What are the company's key assets? What do they need to protect? (An asset is an item of property owned by a person or company.

Reference no: EM133244642

Questions Cloud

Discuss how common paas solution stacks : CYB 340 University of Phoenix Discuss how common PaaS solution stacks, such as LAMP, WAMP, etc., can be used for application development. Explain how choosing
How the issue influences psychology ethics : A detailed explanation of the issue. A discussion of how the issue influences psychology ethics from an objective (scholarly) perspective
What are the advantages of using a written contract : CTS 2314 Palm Beach State College What are the advantages of using a written contract when engaged in a computer consulting job?
What is unique about generation z in terms of marketing : What is unique about Generation Z in terms of marketing? How do you best reach this generation with your message focusing on brand image
What are the companys key assets : What are the company's key assets? What do they need to protect? (An asset is an item of property owned by a person or company
Address network, server, and workstation firewalls : ISOL532 University of the Cumberlands Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness
What are advantages and limitations of using a decision tree : Explain the reasons/reasons for Nike Inc. on its mission statement. What are the advantages and limitations of using a decision tree
How you will ensure email integrity and confidentiality base : Explain how you will ensure email integrity and confidentiality based on the scenario and Describe TWO (2) risks with customers using free public Wi-Fi to shop
Explain the data breaches and what kinda attacks are they : Explain the following data breaches and what kinda attacks are they in detail. LinkedIn; June 2021; 700 million users Facebook; April 2019; 533 million users

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd