This website uses cookies to ensure you have the best experience. Learn more

Information Security Article Evaluation Essay

922 words - 4 pages

Information Security Article Evaluation
CMGT/441
July 10, 2013

Confidentiality

As I was looking on the internet trying to locate a website to write my paper about, an article from Consumerreports.org got my attention. The article was about social media privacy. In June 2012, Consumerreports.org posted an article called “Facebook & your privacy: (Who sees the data you share on the biggest social network”), which attempts to explain and give several reasons how your privacy is being violated by social ...view middle of the document...

This is a main issue that Consumerreports.org says leaves users unprotected if they don’t know how to use the Facebook privacy controls. Nevertheless as a user of Facebook I believe these changes have had no effect on my Facebook account or any effect on my perspective of this company. It is up to the user to understand the websites policy’s and try abiding by those policies.
Consumerreports.org also states that U.S. online privacy laws are weaker than those of Europe and much of the world, so there are not many federal rights to oversee and control most of the information that social networks obtain about you. Eleven percent of households using Facebook said they had trouble last year, ranging from someone using their log-in without permission to being harassed or threatened. That projects to 7 million households 30 percent more than last year, according to Consumerreports.org. the fact the online privacy rights are weaker here than in Europe.is true but I think the fact that 11 percent of people had problems with log-in takeovers, harassments and threats was due to in-proper management of their accounts , that I believe isn’t Facebook’s fault. If you as the user are not using the tools provided by the social media site, then you basically leave yourself open for attack. I do not agree with Consumerreports.org at all when it comes to this and I feel that it is placing all the blame on Facebook and none on the user.

Overall I think the website didn’t do a good job telling the whole story. For example I found on another website that called (mindshift.com) stated that 60% of Facebook users keep their profiles private, and most report high levels of confidence in their ability to manage their settings and that users have...

Other Essays Like Information Security Article Evaluation

Information Needs for the Ais Essay

1543 words - 7 pages focused the companies have the potential to gain lifelong customers. 3. Evaluate the level of system security (i.e., high, medium, low) needed to ensure information integrity within automated business systems. Provide support for your evaluation. Automated business systems refer to measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. In today’s

5 Reasons to Obfuscate Your Work

606 words - 3 pages evaluation of the effectiveness of information security policies, procedures, practices, and security controls to be performed with a frequency depending on risk, but no less than annually; A process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in the information security policies, procedures, and practices of the organization; Procedures for detecting, reporting, and responding to

Computers In Homeland Security

971 words - 4 pages American government (federal, state, and local), and private owners it could be possible. Much of this information is not exactly accessible due to the fact that this new technology isn?t released yet. The National Computer Security Center uses trusted computers systems and components to follow out their testing. The NCSC is another branch that regulates computers. The NCSC's computer evaluation program is carried out by another NSA

Information Technology/Network Security Threats

1465 words - 6 pages official, accreditation based on the verified effectiveness of security controls to some agreed-upon level of assurance and an acceptance of identified residual risk to agency assets or operations. The decision is risk-based and supported by testing and evaluation results produced during the security control verification process. Operations / Maintenance Phase in this phase of the SDLC, information systems are operating, and may undergo

CARS Decision Making Technique Article Review - MGT 350: Critical Thinking (Article Review Of A Decision Making Technique, Including Applications And Limitations)

918 words - 4 pages includes making decisions based on articles or reference material that is relevant to our operations. In the environmental, health, safety and security industry, information is consistently presented that requires action in the daily operations at the facility. Before I can use the information for policy changes, projects or recommendations, I must determine if the information presented is applicable and correct. I use the CARS method on each article

Ethical Issues for It and Information Professionals

601 words - 3 pages Ethical Issues for IT and Information Security Professionals Sandra J. Crossin Information Security Management- MGMT 394 Embry Riddle Aeronautical University Abstract This paper summarizes and evaluates an article addressing the ethical issues involved with being information security personnel. It will attempt to show several areas where ethics can become an issue and stimulate questions regarding activities that are not illegal, but

Death Penalty

1373 words - 6 pages Project Part 2: Vulnerabilities in Information Technology (IT) Security To begin,   what’s security vulnerability? Most people think this would be an easy question to answer, but in fact it turns out not to be. This article discusses the definition used by the Microsoft Security Response Center (MSRC) to categorize the variety of issues we examine every day. An unintended flaw in software code or a system that leaves it open to the

Cis438 - Term Paper - Security Regulation Compliance

2307 words - 10 pages Term Paper: Security Regulation Compliance Giancarlos Guerra Strayer University CIS 438 - Information Security Legal Issues Abstract: In this paper I shall provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: i. FISMA; ii. Sarbanes-Oxley Act; iii. Gramm-Leach-Bliley Act; iv. PCI DSS; v. HIPAA; vi. Intellectual Property Law. Describe the security methods and

Scenario Evaluation Plan

737 words - 3 pages Scenario Evaluation Plan HSM/270 Scenario Evaluation Plan The purpose of the PEACE Domestic Violence Agency is to promote a sense of security, support, and empowerment for individuals and families who are affected by domestic violence. To continue helping those who suffer from domestic abuse, the PEACE agency will develop an evaluation plan using a simple framework design. This agency wants to assess the work it is performing

Research Paper

1057 words - 5 pages Office of the President. This Council functions as an advisor to the President. Information Security This title and its subchapter provide tactics and mechanisms for protecting federal information and preserve information security. In addition, it also establishes set standards, responsibilities, authorities and functions, the various definitions in information security and an annual independent evaluation. Department of Justice Divisions

Critique of Anthropology

655 words - 3 pages scientific investigations are often stalled for months or even years due to the lack of security and resources,” (p.27). EAAF has worked on 55 projects the most of any other team. The total number of projects worked on is 145, and at least 1283 sites were surveyed during the 1990’s as statistical figures given by Steadman and Haglund. The authors obtain information by using surveys in human rights organization groups. The information collected

Related Papers

Information Security Essay

3489 words - 14 pages measures in place, the protection tends to be ineffective with staff taking a reactive approach over a proactive approach. The article by Allen Johnston and Ron Hale examine the planning for information security and enhancing the quality of security. “A survey conducted by the Computer Security Institute and the Federal Bureau of Investigation found:” 56% of respondents reported unauthorized computer system use during the past year. These

Analysis Of Choicepoint

586 words - 3 pages recommendation to Derek Smith is to take an “end-to-end view of business processes” that goes beyond the “technological viewpoint” he currently has for the business. He must embrace a more comprehensive viewpoint of data security in his organization, and I believe the balanced scorecard approach provides an effective framework for him to work with. In the article, “Management’s Role in Information Security in a Cyber Economy,” the authors portray the

High Performance Work System Essay

614 words - 3 pages [Critical Evaluation of High Performance Work Systems] [Writer’s name] [Institute’s name] [Date] Critical Analysis of the Journal Article Introduction The article relates to a lot of companies gaining success in terms of sales as well as employment growth with the help of High Performance Work Systems (HPWS). The article suggests the enhanced business performance relating to HPWS which is valid but partial. Critical Analysis The

Risk Assessment Essay

3724 words - 15 pages objectives. The challenge enterprises face today is in adopting a robust, process-oriented information security risk assessment framework to comply with the control objective. The Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE®) approach is one such framework that enables organisations to understand, assess and address their information security risks from the organisation’s perspective. OCTAVE is not a product, rather it is a