Due Week 2 and worth 120 points Social networks afford individuals the venue and technology to connect with many friends, both known and unknown. An individuals activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employees employer, such as LinkedIn. Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company. Write a four to six(4-6) page guidelines for accessing Web 2.0 sites that: Select and describe three (3) social networking sites you are presenting in the context of cloud computing. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected. Summarize the mitigating strategies you would recommend to your CEO that affirm the organizations privacy and security practice among social network sites. Suggest three (3) ways that your social network policy can protect your employer against: identity theft cybercrimes abusive marketing Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Compare and contrast private with public clouds. Summarize business applications that can migrate to the cloud. Use technology and information resources to research issues in cloud computing environments. Write clearly and concisely about cloud & virtual computing topics using proper writing mechanics and technical style conventions.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more