Explanation of Solution
Two source of SM risk:
The two source of social media risk is as follows:
- Managing the risk of Employee Communication
- Managing the risk of Inappropriate Content
Managing the risk of Employee Communication:
The organization should take it to develop and advertise a social media policy, which means this policy is used to helps to protect the organization name and also rights and responsibilities of employees must be defined.
Managing the risk of Inappropriate Content:
The organization must take care of inappropriate content before engaging in social media. User-generated content (UGC) which is nothing but create a fake content about the organization in social media site.
Social media policy:
Social media policy is nothing but how an organization and its employees should connect themselves via online. This policy document helps to protect the organization brand reputation and also defines the employee’s responsibilities and rights.
Summary of Intel’s guiding principles:
Intel Corporation has initiated employee-trusting social media policies, policies that is used to change as the company gains more experience with employee written SM. There are three key points of Intel policy:
- Disclose:
- Employees must use real name and employer ie. Be transparent to everyone in the organization.
- Be fake and truthful to the organization.
- Don’t change your originality, be yourself in an organization
- Protect:
- Don’t criticize the competition to others.
- Avoid telling secrets to others.
- Don’t overshare.
- Use common sense:
- Employee must make their contribution worthwhile.
- Don’t respond to every criticism or inflame.
- Accept mistakes.
Social media mistake:
“The British actor Rowan Atkinson (Mr. Bean) was died at 62 after car crush - July, 2017” was tweet in FOX BREAKING NEWS.
- But in reality he was alive. When the user click the link it was directs to a video, which play 2 seconds and tell to the watchers to click on a Facebook link to continue viewing, according to the report...
Want to see the full answer?
Check out a sample textbook solutionChapter 8 Solutions
Using MIS (10th Edition)
- You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years. What you have to answer: a) describe the goals of the business and the focus of the risk assessment( make it short please) thank youarrow_forwardDiscuss why understanding cyber threats is so crucial and how they might harm your business. Determine and explain the impact of a recent cyberattack on the company's revenue, profit, or brand. Compare and contrast the similarities, differences, and overlap between Disaster Recovery, Business Continuity, and Incident Response. Please explain and justify your position. Could you please provide complete answers to these three questions, excluding links and minor details?arrow_forwardIn the context of cybersecurity, managing identity and access is a critical aspect of safeguarding digital systems and data. Please write a reflective essay, individually, on your understanding of managing identity and access. In a minimum of two paragraphs, share your insights into why this topic is important in cybersecurity, the key concepts you've learned, and how effective identity and access management contributes to overall cybersecurity. Additionally, consider the real-world implications and applications of this knowledge in protecting digital assets and mitigating security threats."arrow_forward
- You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years. answer a) and b) :2. High level threat analysis a. Identify all actors b. Identify all information assetsarrow_forwardYou are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years.answer this:a) Describe the goals of the business and the focus of the risk assessmentarrow_forwardYou are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years. 1. Preparation for risk analysis a) Describe the goals of the business and the focus of the risk assessmentplease do question a) ( please don't make it long)arrow_forward
- You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years. a. describe the goals of the business and the focus of the risk assessment( make it short please) thank youarrow_forwardYou are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years. a. Describe the goals of the business and the focus of the risk assessmentarrow_forwardQuestion 13 sum .Create a one page set of Security Design Recommendations for VPN and DMZ based on the 33 Cybersecurity Engineering Principles. Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forward
- Which of the following is a benefit of including a risk management framework into an organization's security approach? It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner. It identifies specific vendor products that have been tested and approved for use in a secure environment. It provides legal assurances and remedies in the event a data breach occurs. It incorporates control, development, policy, and management activities into IT operations. A. B. C. D.arrow_forwardWhy is it beneficial for an information technology or information systems professional to have an understanding of privacy and law? Privacy is a rapidly expanding area, with new laws and requirements. How does it fit in with cybersecurity rules, and data breach reporting rules? Describe some difficulties that might occur if a CIO or CISO did not properly understand law, including about cybersecurity and privacy. Describe some difficulties that might occur if a lower level technology employee did not properly understand law, including about cybersecurity and privacy. Describe some difficulties that might occur if a company’s lawyer (who needs to give good legal advice) did not properly understand technology.arrow_forwardFirewall protection and security should be established as a foundational topic before moving on to other topics. Don't just provide a definition of the term and call it a day; back up your claim with some examples and data to show why it's applicable to the business world.arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning