Explanation of Solution
Two source of SM risk:
The two source of social media risk is as follows:
- Managing the risk of Employee Communication
- Managing the risk of Inappropriate Content
Managing the risk of Employee Communication:
The organization should take it to develop and advertise a social media policy, which means this policy is used to helps to protect the organization name and also rights and responsibilities of employees must be defined.
Managing the risk of Inappropriate Content:
The organization must take care of inappropriate content before engaging in social media. User-generated content (UGC) which is nothing but create a fake content about the organization in social media site.
Social media policy:
Social media policy is nothing but how an organization and its employees should connect themselves via online. This policy document helps to protect the organization brand reputation and also defines the employee’s responsibilities and rights.
Summary of Intel’s guiding principles:
Intel Corporation has initiated employee-trusting social media policies, policies that is used to change as the company gains more experience with employee written SM. There are three key points of Intel policy:
- Disclose:
- Employees must use real name and employer ie. Be transparent to everyone in the organization.
- Be fake and truthful to the organization.
- Don’t change your originality, be yourself in an organization
- Protect:
- Don’t criticize the competition to others.
- Avoid telling secrets to others.
- Don’t overshare.
- Use common sense:
- Employee must make their contribution worthwhile.
- Don’t respond to every criticism or inflame.
- Accept mistakes.
Social media mistake:
“The British actor Rowan Atkinson (Mr. Bean) was died at 62 after car crush - July, 2017” was tweet in FOX BREAKING NEWS.
- But in reality he was alive. When the user click the link it was directs to a video, which play 2 seconds and tell to the watchers to click on a Facebook link to continue viewing, according to the report...
Want to see the full answer?
Check out a sample textbook solutionChapter 8 Solutions
Using MIS (10th Edition)
- Explain why cyber threats are so significant and how they might harm your firm. Analyze and describe a recent cyber-attack and how it impacted the company's revenue, profit, or brand. Explain how Disaster Recovery, Business Continuity, and Incident Response vary and overlap. Explain and defend your position. Could you please answer those three questions in full, without links or minor details?arrow_forwardQuestion V .In the lesson, you learned about various standards that are used in Governance, Risk and Compliance. One of these is the GDPR which has far-reaching consequences in the current cybersecurity world. List at least two instances of organizations getting fined for violating GDPR standards. Ensure that you research why these organizations were fined and, in your own words, suggest how they could have avoided these fines. Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forwardIn the context of cybersecurity, managing identity and access is a critical aspect of safeguarding digital systems and data. Please write a reflective essay, individually, on your understanding of managing identity and access. In a minimum of two paragraphs, share your insights into why this topic is important in cybersecurity, the key concepts you've learned, and how effective identity and access management contributes to overall cybersecurity. Additionally, consider the real-world implications and applications of this knowledge in protecting digital assets and mitigating security threats."arrow_forward
- Phishing attack simulation using Packet Tracer is a critical exercise in understanding and defending against cyber threats. In a minimum of two paragraphs, please reflect on your understanding of this topic. Share your insights into what phishing attacks are, how they are simulated using Packet Tracer, and the importance of this exercise in enhancing cybersecurity awareness and skills. Additionally, discuss any challenges or key takeaways you've gained from the simulation, and how this experience contributes to your knowledge of cybersecurity practices.arrow_forwardWhich of the following is a benefit of including a risk management framework into an organization's security approach? It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner. It identifies specific vendor products that have been tested and approved for use in a secure environment. It provides legal assurances and remedies in the event a data breach occurs. It incorporates control, development, policy, and management activities into IT operations. A. B. C. D.arrow_forwardYou are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years. answer a) and b) :2. High level threat analysis a. Identify all actors b. Identify all information assetsarrow_forward
- I need help with this question for my Risk management class. Thank you Cyber Ransom and Risk Organized crime has gotten more brazen in launching cyber attacks against various technology infrastructures, websites, operations and access to supply chains and bank accounts, then demanding ransom. With the premise of it’s not IF you'll be attacked, but WHEN you’ll be attacked, what are some ways to be more proactive in mitigating the risk of cyber ransom attacksarrow_forwardExplain why it is important to recognise cyber threats and how they may damage your business. Analyze and explain a recent cyber-attack and its impact on the company's revenue, profit, or brand. Examine the similarities, differences, and overlaps between disaster recovery, business continuity, and incident response. Please express and defend your point of view. Could you please write the answers to those three questions completely, without any links or small details?arrow_forwardWhy is it beneficial for an information technology or information systems professional to have an understanding of privacy and law? Privacy is a rapidly expanding area, with new laws and requirements. How does it fit in with cybersecurity rules, and data breach reporting rules? Describe some difficulties that might occur if a CIO or CISO did not properly understand law, including about cybersecurity and privacy. Describe some difficulties that might occur if a lower level technology employee did not properly understand law, including about cybersecurity and privacy. Describe some difficulties that might occur if a company’s lawyer (who needs to give good legal advice) did not properly understand technology.arrow_forward
- The interns who appear to be violating numerous security rules are approached by the CISO and express their discontent. They don't encrypt their workstations, download illegal music, link their personal gadgets to company computers, spend too much time on social media, and download pornographic material on business systems, claims the corporation. The CISO advises you to develop a security document (Rules of Behavior) with at least 15 rules defining what employees are allowed and not allowed to do when connected to the company network.arrow_forward1. What other technology risks exist in organizations beyond traditional information security risks?2. Define cyber risk. What are some problems organizations can face from these types of risks?3. Define and give examples of enterprise risk.4. Define and give examples of ecosystem risk.5. What is the purpose of a cyber risk management framework? From the book IT Strategy & Innovation, Edition 5.0arrow_forwardCreate and describe a comprehensive security policy for the company that will: Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning