Cybersecurity. Social networks. IT & Computer Science Essay
Please keep this format and just write the answer under each question so I know which one belongs to each one. Please make the answers equivalent to 1 page. Thanks.
1. Emerging vulnerable areas for cybersecurity include; Social Networks, mobility, remote hostile takeovers, and the Smart grid. Select one vulnerable area and review threats and effective management policies to counter the risks within that area.
2. The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity. We now see threats from all parts of the globe. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level?
3. A. What is the purpose of a vulnerability assessment?
B. Describe the key steps and common elements of vulnerability assessments and how often these assessments should take place.
Cybersecurity
Name
Institution
Cybersecurity
Question One
Social networks and social networking has become an important part of life and with it comes a range of cybersecurity threats. One of the threats is the invasion of privacy where intruders collect personal information from social network sites without the user’s permission (Jang-Jaccard& Nepal, 2014). This information can be used for a number of reasons, including illegitimate ones. To counter this threat, service providers should ensure that sensitive user information is encrypted (Jang-Jaccard& Nepal, 2014). This will ensure that access to such data by intruders is restricted. Malware attacks are also a common threat on social networks (Jang-Jaccard& Nepal, 2014) which should be countered by installing software to block malware.
Question Two
To mitigate the risks related to cybersecurity attacks, there are policies that firms should put in place. The first policy should be on employees’ cyber threats training. According to Comizio, Dayanim, and Bain (2016) educating employees on their role-specific cyber threats will ensure that they are able to stay alert and take necessary precautions. Second, they should also formulate a policy on incidence response by first establishing all the possible incidents. Third, they should monitor suspicious und...
π Other Visitors are Viewing These APA Essay Samples:
-
Week 4: Business continuity plans (BCP)
1 page/β275 words | 4 Sources | APA | IT & Computer Science | Essay |
-
Individual Assignment. Emerging Cybersecurity Technologies. IT Essay
12 pages/β3300 words | 6 Sources | APA | IT & Computer Science | Essay |
-
Week 2 Topic 1: What are Advanced Persistent Threats
1 page/β275 words | 2 Sources | APA | IT & Computer Science | Essay |