Cybersecurity. Social networks. IT & Computer Science Essay
Please keep this format and just write the answer under each question so I know which one belongs to each one. Please make the answers equivalent to 1 page. Thanks.
1. Emerging vulnerable areas for cybersecurity include; Social Networks, mobility, remote hostile takeovers, and the Smart grid. Select one vulnerable area and review threats and effective management policies to counter the risks within that area.
2. The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity. We now see threats from all parts of the globe. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level?
3. A. What is the purpose of a vulnerability assessment?
B. Describe the key steps and common elements of vulnerability assessments and how often these assessments should take place.
Cybersecurity
Name
Institution
Cybersecurity
Question One
Social networks and social networking has become an important part of life and with it comes a range of cybersecurity threats. One of the threats is the invasion of privacy where intruders collect personal information from social network sites without the user’s permission (Jang-Jaccard& Nepal, 2014). This information can be used for a number of reasons, including illegitimate ones. To counter this threat, service providers should ensure that sensitive user information is encrypted (Jang-Jaccard& Nepal, 2014). This will ensure that access to such data by intruders is restricted. Malware attacks are also a common threat on social networks (Jang-Jaccard& Nepal, 2014) which should be countered by installing software to block malware.
Question Two
To mitigate the risks related to cybersecurity attacks, there are policies that firms should put in place. The first policy should be on employees’ cyber threats training. According to Comizio, Dayanim, and Bain (2016) educating employees on their role-specific cyber threats will ensure that they are able to stay alert and take necessary precautions. Second, they should also formulate a policy on incidence response by first establishing all the possible incidents. Third, they should monitor suspicious und...
You Might Also Like Other Topics Related to social networking:
- W2: Reflection Career Exploration Writing 1 page/≈275 words | No Sources | APA | Health, Medicine, Nursing | Essay |
- Internet Addiction and Mental Health4 pages/≈1100 words | No Sources | MLA | Creative Writing | Essay |
- Integrated Marketing Communication of Tesla5 pages/≈1375 words | 5 Sources | MLA | Business & Marketing | Term Paper |
- Argumentative Essays Facebook, Twitter, LinkedIn, YouTube1 page/≈550 words | No Sources | APA | Literature & Language | Essay |
- Advantages Of Using Facebook Outweigh The Dangers & Other Shortcomings1 page/≈275 words | 1 Source | MLA | Social Sciences | Essay |
- Networking Options. Examine the business’s issues to determine network requirements2 pages/≈550 words | 2 Sources | APA | IT & Computer Science | Essay |
- Networking Relationships3 pages/≈825 words | 3 Sources | APA | Management | Essay |