Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Discuss how you ensure organizational security in the age of social media when s

ID: 3857582 • Letter: D

Question

Discuss how you ensure organizational security in the age of social media when so many employees are on services such as Facebook, LinkedIn, and the like. With the use of smart phones with GPS features combined with these services, determine the security issues that need to be considered and how to address them. Explain how you can incorporate the desirable capabilities of social media into the corporate environment securely, and identify the technical risks and ethical issues you will encounter while doing so.

Explanation / Answer

There are many types of social networks available such as Facebook, LinkedIn, and the hike.
Most social networks combine elements of more than one of these types of networks, and the focus of a social network may change over time.
-Personal Network
-Status update network
-Location network
-Content-sharing network
-Shared-interest network
Social networks themselves do not necessarily guarantee the security of the information that has been uploaded to a profile, even when those posts are set to be private.So the question comes here how,you can we incorporate the desirable capabilities of social media into the corporate environment securely.
Mobile devices are small, easily portable and extremely lightweight. While their diminutive size makes them ideal travel companions, it also makes them easy to steal or leave behind in airports, airplanes or taxicabs. As with more traditional devices, physical access to a mobile device equals “game over.” The cleverest intrusion-detection system and best anti-virus software are useless against a malicious person with physical access.
Data encryption isn't just for technology geeks; modern tools make it possible for anyone to encrypt emails and other information.GPG for Mail, for example, is an open source plug-in for the Apple Mail program that makes it easy to encrypt, decrypt, sign and verify emails using the OpenPGP standard.
One of the most basic, yet often overlooked, data protection tips is backing up your data. Basically, this creates a duplicate copy of your data so that if a device is lost, stolen, or compromised, you don't also lose your important information.
They get information from you when you do things like make a purchase from them,they collect it from how you use their products and services,they obtain information from other sources, like credit agencies, marketing companies, and other service providers.
A rules-based procedure for making calculations or solving problems. Algorithms are everywhere in computer science and are crucial to the software that runs the world. In social media, the most important algorithms are those that determine which content we see. For example, your Facebook News Feed doesn’t show every status update and every photo from every one of your friends. Instead, it displays an algorithmically curated set of content that Facebook thinks is most worth seeing. Similarly, Twitter, Facebook, and Google Plus use algorithms to define which topics and hashtags are currently trending.
A ‘Bio’, short for biography, is the small portion of your online profile that explains to new or potential followers who you are. All social platforms have some version of a Bio as they are valuable in attracting new followers with similar interests. When it comes to your Twitter strategy, your Bio is the first thing users see when they discover your profile and a good Bio can greatly improve how often you show up in keyword searches.

The question is very small but believe me explanation can go very big and vast. I hope this will definitely answer your question.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote