CIS403_Social_Networking_Security

CIS403_Social_Networking_Security - Social Network Users...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Social Network Users generally have no idea how their private information has the potential to negatively effect their businesses or quality of life. What types of computer crime can be launched against an organization that uses social networks to advertise their businesses? Employees downloading malware, phishing schemes, identity theft, key logging, social engineering What types of computer crime can be launched against individuals who post personal information on their social network sites? Phishing schemes, identity theft, cyber bullying, Nigerian 419 advanced fee scam, social engineering, key logging Please research and list simple - easy to follow step-by-step instructions on how to secure one of the following social network applications to prevent private information from becomming public: 1. Facebook 2. Twitter 3. FourSquare 4. YouTube 5. Flickr 6. MySpace Be thorough, consistent, and professional with your instructions. Use pictures if possible and start your procedure for securing each site by educating users on the potential
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

CIS403_Social_Networking_Security - Social Network Users...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online