Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

. Go to the SEC.gov website and write down what types of internet fraud they ide

ID: 3884530 • Letter: #

Question

. Go to the SEC.gov website and write down what types of internet fraud they identify

2. How should you protect yourself

3. Compare to the security policies of 2 internet cloud providers

            examples include: icloud; dropbox, box, etc

What should you do if there is a breach?

Who should you contact

What does the FTC say about disposing of technology? What are the steps?

Online Privacy

Read and compare the privacy statements for

i.Facebook

ii.Google

iii.Firefox

iv.Verizon

Browser security

Examine the browser security for Chrome, Firefox, Explorer and Safari

i.How do you clear browsing history

ii.Do they keep data and how can you erase it

iii.Do they keep passwords

iv.Pop-ups – how are they managed with each browser

v.Which do you feel has greatest security?

Explanation / Answer

2. How should you protect yourself

- Always try to give minimum information when required and nothing more when asked by online companies or organisations.
- Make sure that you alwatys Identify Phishing and Spear Phishing Attempts in online.
- Always be aware and be caucious about the Suspicious Emails and Attachments
- Even though you are protected by antivirus software always try to Keep Your Anti Malware Software Up to Date so that you can be very protective.
- Always use the Strong passwords when ever you are using it and try keep Secure Passwords and different ones on Different WebSites and sites.

3. Compare to the security policies of 2 internet cloud providers
examples include: icloud; dropbox, box, etc

Let take the icloud and dropbox:
- Dropbox uses the modern encryption method for storing and transfering the data.
- The dropbox applications and infrastructure are tested regulary to enhance security.
- In dropbox public files are just viewable by people who has the access and link to the files.
- The dropbox are prepared by the multilayers of protections.
- The secure data,transfer,network conf, and applications are control by the secure infrastructure in dropbox.

Icloud:
- icloud has a pretty good reputation when it comes to security across its devices.
- In icloud the data is encrypted both in transit and at rest on the server using the SSL.
- The iCloud keychain encryption keys are created on your own devices and Apple can't access them.
- The Apple states that anyone or who uses the apple product cannot access to core material used by the trusted devices and also you must have approval of access from your iCloud keychain.


What should you do if there is a breach?

I will Save and secure all the personal data or business data of a organisation or a big company.
- In order to align security with the corporate culture we should Understand the values and culture of your organization
- We should Understand the current Strengths and the Weaknesses, and Opportunities, and Threats in the business.
- Identifying what needs to be done in the company or in an organisation.
- Identifying what should be done in order to secure the data in business.
- Promoting the security work of the team
- Learn to secure and give max protection and try to innovate with the business so that it will be useful to business development


Who should you contact
- Main CEO of the organisation
- Security team of the organisation
- And also the administrators

What does the FTC say about disposing of technology? What are the steps?

- The FTC says that the Developing a security team mission statement that will be used in an company or in an organizational with there goals in securing the data.
- In order to make the team more successful we should try to Learn to identify, understand, and manage customers.
- In order to have better understand in security business goals we should Identify the better security policies.
- we always make sure of business and there Understanding on doing business and how business data has been secure.
- Make more information os security to Apply analysis on vendors
- Understand the hackers and attacker motivations and techniques in all aspects
- Understand assets and process of business that are most valuable to the business.
- Learn the strategic planning of kill chain and threat intelligence in all levels.


Examine the browser security for Chrome, Firefox, Explorer and Safari
i.How do you clear browsing history
By using the ctrl+H key we can clear the browsing history
Or in settings goto history and clear the browsing history

ii.Do they keep data and how can you erase it
we can keep data in emails and drives in online. And we can delete it whenever we want them to delete.
Example: Storing files as attachments in mails
storing files in google drive.

iii.Do they keep passwords
Yes in order to secure the data we can keep passwords for the files and folders in online.
  
iv.Pop-ups – how are they managed with each browser
Every pop ups can be disable in browser in settings and in advance settings in all browsers.
Wheneve there is a popup we can enable and disable it by clicking on it and take necessary options.


v.Which do you feel has greatest security?

I feel very secure and protective .
we can be more active in order to search the new innovative to our company or organisation.
We must also be aware and protective about the future treats
We must take necessary actions before the treats comes to us.
We must know all the secure policies and levels to protect ourselfs.