Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
4 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

Cybersecurity. Social networks. IT & Computer Science Essay

Essay Instructions:

Please keep this format and just write the answer under each question so I know which one belongs to each one. Please make the answers equivalent to 1 page. Thanks.
1. Emerging vulnerable areas for cybersecurity include; Social Networks, mobility, remote hostile takeovers, and the Smart grid. Select one vulnerable area and review threats and effective management policies to counter the risks within that area.
2. The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity. We now see threats from all parts of the globe. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level?
3. A. What is the purpose of a vulnerability assessment?
B. Describe the key steps and common elements of vulnerability assessments and how often these assessments should take place.

Essay Sample Content Preview:

Cybersecurity
Name
Institution
Cybersecurity
Question One
Social networks and social networking has become an important part of life and with it comes a range of cybersecurity threats. One of the threats is the invasion of privacy where intruders collect personal information from social network sites without the user’s permission (Jang-Jaccard& Nepal, 2014). This information can be used for a number of reasons, including illegitimate ones. To counter this threat, service providers should ensure that sensitive user information is encrypted (Jang-Jaccard& Nepal, 2014). This will ensure that access to such data by intruders is restricted. Malware attacks are also a common threat on social networks (Jang-Jaccard& Nepal, 2014) which should be countered by installing software to block malware.
Question Two
To mitigate the risks related to cybersecurity attacks, there are policies that firms should put in place. The first policy should be on employees’ cyber threats training. According to Comizio, Dayanim, and Bain (2016) educating employees on their role-specific cyber threats will ensure that they are able to stay alert and take necessary precautions. Second, they should also formulate a policy on incidence response by first establishing all the possible incidents. Third, they should monitor suspicious und...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to social networking:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!