CIS539 Strayer University Cloud Computing
Question Description
Social networks afford individuals the venue and technology to connect with many ” friends”, both known and unknown. An individual’s activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employee’s employer, such as LinkedIn.
Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.
Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:
Select and describe three (3) social networking sites you are presenting in the context of cloud computing.
Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.
Summarize the mitigating strategies you would recommend to your CEO that affirm the organization’s privacy and security practice among social network sites.
Suggest three (3) ways that your social network policy can protect your employer against:
identity theft
cybercrimes
abusive marketing
Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources.
“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”