{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CIS403_Social_Networking_Security

CIS403_Social_Networking_Security - Social Network Users...

Info icon This preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Social Network Users generally have no idea how their private information has the potential to negatively effect their businesses or quality of life. What types of computer crime can be launched against an organization that uses social networks to advertise their businesses? Employees downloading malware, phishing schemes, identity theft, key logging, social engineering What types of computer crime can be launched against individuals who post personal information on their social network sites? Phishing schemes, identity theft, cyber bullying, Nigerian 419 advanced fee scam, social engineering, key logging Please research and list simple - easy to follow step-by-step instructions on how to secure one of the following social network applications to prevent private information from becomming public: 1. Facebook 2. Twitter 3. FourSquare 4. YouTube 5. Flickr 6. MySpace Be thorough, consistent, and professional with your instructions. Use pictures if possible
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}