How do social networks and cloud computing increase


This activity addresses the following module outcome:

MO1: Compare internal and external threats and the sources of data breaches.

While there are plenty of threats to information systems, there are also ways to mitigate many of those threats. Organizations that have focused on information security will have created a risk management program that helps with the mitigation of those threats.

In preparation for this discussion, please read the required material and watch the assigned videos, then respond to the following:

In your initial post, answer the following questions from the textbook:

1. How do social networks and cloud computing increase vulnerability?

2. Why are patches and service packs needed?

3. How are the motives of hacktivists and APTs different?

4. Explain why data on laptops and computers need to be encrypted.

5. Explain how identity theft can occur.

(Turban et al., 2017).

In your response, complete the following:

1. Identify additional identity theft methods not listed by your fellow student.

Your response should be substantive (at least 150 words) and include reference citations and, APA formatting.

Solution Preview :

Prepared by a verified Expert
Business Economics: How do social networks and cloud computing increase
Reference No:- TGS02843978

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)