SlideShare a Scribd company logo
1 of 7
Running Head: CAPSTONE PROJECT
1
CAPSTONE PROJECT
7
Recommendations Concerning Security
Name
Course
Professor
10/7/2017
Recommendations Concerning Security
Introduction
Verbania, Inc., first needs to identify its users and create a
community that can be easily identified where its needs will be
met and this comes with knowing and understanding their
preferences and dislikes (Rampton, 2017). There are
psychological factors to be understood in this community as
they will be consuming information being provided for them
hence the need to define the features and functions based on the
community’s quality. Choosing the right technology is key in
determining the effectiveness and efficiency of the network that
will be used and professionals have to be involved in the
evaluation process (Rampton, 2017). Having a structure in place
is also important as it requires that customer service, security,
and scalability be incorporated to the website or application so
that users can be kept longer on the site's activities. Quality
activity stream is another aspect of the system that must be
developed and it be of great quality so that it can be attractive
to the target community. Status update features are critical for a
social media network as it increases the chances of users
engaging with the site citing that most of them want to express
their feelings freely and it makes people to be immediately
hooked to them as they are addictive. With these in mind,
Verbania, Inc., has to come up with a security plan, security
policy and security solution to the social networking Web site
and application for quality use by the target community
(Rampton, 2017).
Security Plan
Disaster Recovery
Verbania, Inc., should not have any data loss, and thus the
importance of having in place a fundamental procedure to
define step-by-step measures that should be used so as to make
the system or network that was disrupted to recover while the
end goal is to initiate normal operations. The recovery plan will
be that the IT systems as well as networks be recovered from
the disaster by having a set of priorities towards the time factor
whereby the normal operations should be reinstated (Kirvan,
2009).
In the risk management plan, there could be a situation that
might be caused either within the organization, hackers, brought
about by an employee’s device or a user and it should be
assessed (Kirvan, 2009). This is because it could affect the most
critical infrastructure responsible for the day-to-day operations
of the system in place. In terms of viability, competitiveness,
and financial solidness, the organization has to make sure that
the IT system is fully operational (Kirvan, 2009). It is essential
to develop the necessary contingency plan policy where it is a
statement in which the organization will work manually without
the help of the IT system in place to complete the da-to-day
business activities. This will help in giving the system’s
specialist to identify the areas that need to be analyzed. This
will involve the information security officer meeting with the
internal IT, applications, as well as networking administrator
teams so as to establish a situation that is to be investigated
(Kirvan, 2009).
Password Creation and Protection
Having a strong password protocol will ensure that the system
is well-protected from cyber-attacks and this applies to every
single component that is used to access and store information
(Steinberg, 2011). The information that users provide when
signing up could be sensitive to the user hence the need to
guard it in the strongest way possible since Verbania, Inc.,
would want that unique passwords be used as they will identify
the users when they want to log in. It implies that when creating
the password, it must be strong enough whereby it should
“contain numbers, letters and symbols.” (Steinberg, 2011).
Remote Access
Only authorized employees of Verbania, Inc., will be given
access to the social Web site and application system citing that
the user information and related data will have to be restricted
for security purposes (Sherry, 2008).
Routers and Switches Security
Verbania, Inc., needs to create and set strong passwords for
their routers and switches because the network to be used will
be getting a lot of traffic and thus could be exposed to certain
network vulnerabilities (Sherry, 2008).
Wireless Communication
Verbania, Inc., will have to create a system that allows smooth
communication with users so that they can be updated with the
current information from any location and it must contain
network security protocols (Sherry, 2008).
Server Security
Verbania, Inc., has to encrypt its server citing that it will be
storing a lot of sensitive data that can only be accessed by
authorized personnel hence it should be stored away from the
organization’s premises to guarantee its security (Sherry, 2008).
Acceptable Encryption
Encryption has to be authorized by the security officers as well
as management and it can only be to a given extend because it
has to be accessed at given time when necessary. Additionally,
the encryption should be set in such a way that a single master
file will be stored with the sensitive information (Sherry, 2008).
E-mail
The e-mail address is the most used information by both users
and employees thus the importance of protecting it from access
to unauthorized users who might be aiming at steal information
about the user or Verbania, Inc., itself (Sherry, 2008).
Security Policy
Verbania, Inc., will provide many benefits to its user-base while
it is assess its risk tolerance scale because the representation of
businesses has changed creating a lot of opportunities for
benefits, however, monitoring and measuring the risks involved
is imperative for the organization (Patel & Jasani, 2010). Direct
access to customers will be allowed thus creating an opportunity
for the company to take advantage of the opportunity as a
monetizing its operations, however, there are problems
associated with it as well. Therefore, the way to receive instant
feedback from the clients and customers of the company will be
critical in expanding its business. Verbania, Inc., will also
adopt to the norm of using its platform for hiring and recruiting
since information concerning prospective employees will be
available for employers to get more information prior to hiring
personnel (Patel & Jasani, 2010).
Verbania, Inc.’s security policy will follow that:
· Employees using the system will not be exempted from
privacy when their resources are being used.
· Social network and general technology policies will be
separated.
· Privacy and data security policies will be addressed in length.
· The use of social media to attack, bully, harass, discriminate
or violate the law is prohibited.
· Documenting the policies will be critical in monitoring and
implanting them.
Security
Solution
Verbania, Inc., should ensure that when creating an account and
a profile, discussion forums and posting and search capability
for people, they should all ensure the user information is
secured from vulnerable attacks. The gaming component,
calendar component for reminders and instant messaging and
Voice Over Internet protocol (VOIP)-type calling between
friends have to be controlled by the company’s internal systems
that notify the users whenever an issue arises with their account
so as to keep it secure. Verbania, Inc., should also buy a server
that is encrypted and developed with secure account and email
feature to ensure that the system’s operations allow or its
availability seven days a week.
The process of a potential user joining the social networking
Web site for the first time should follow that there is a protocol
set will policies that can collect, store, back up, and mine user
data to better understand users. Furthermore, there have to be
algorithms in place that can integrate collected data with
customer relationship management (CRM) to improve business
and customer support processes. And finally, provide essential
tools that have the ability to analyze user patterns, behavior,
and generated traffic to present to advertisers.
Finally, the social networking application must be built on a
system that is strong to allow for account setup and log-in
functionality, creating a profile, add or remove friends, and post
to discussion area. This should be done autonomously without
any hitches.
References
Kirvan, P., F. (2009 September). Minimizing business risk with
disaster recovery audits. TechTarget. Retrieved from
http://searchdisasterrecovery.techtarget.com/feature/Minimizing
-business-risk-with-disaster-recovery-audits
Patel, N., & Jasani, H. (2010). SOCIAL MEDIA SECURITY
POLICIES: GUIDELINES FOR ORGANIZATIONS. Issues in
Information Systems, Volume XI, No. 1, 2010, pp. 628-634.
Rampton, J. (2017, August 25). How to Create Powerful Social
Network Platform in 8 Steps. Inc. Retrieved from
https://www.inc.com/john-rampton/how-to-create-powerful-
social-network-platform-in-.html
Sherry, D. (2008, December 12). How to create a security policy
for social networks. ComputerWeekly.com. Retrieved from
https://www.computerweekly.com/news/2240020792/How-to-
create-a-security-policy-for-social-networks
Steinberg, S. (2011, July 7). 10 Ways to Keep IT Systems
Secure. Entrepreneur. Retrieved from
https://www.entrepreneur.com/article/219954
Running Head CAPSTONE PROJECT                                    .docx

More Related Content

Similar to Running Head CAPSTONE PROJECT .docx

According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentationguest0df6b0
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating SystemIRJET Journal
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfrohit219406
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health CheckerIRJET Journal
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 

Similar to Running Head CAPSTONE PROJECT .docx (14)

According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Metakortex Presentation
Metakortex PresentationMetakortex Presentation
Metakortex Presentation
 
Finger Gesture Based Rating System
Finger Gesture Based Rating SystemFinger Gesture Based Rating System
Finger Gesture Based Rating System
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdf
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
IRJET- Website Health Checker
IRJET- Website Health CheckerIRJET- Website Health Checker
IRJET- Website Health Checker
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 

More from todd271

Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docxRunning head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docxtodd271
 
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docxtodd271
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxtodd271
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxtodd271
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxtodd271
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxtodd271
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxtodd271
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxtodd271
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxtodd271
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docxtodd271
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docxtodd271
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docxtodd271
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxtodd271
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxtodd271
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docxtodd271
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docxtodd271
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxtodd271
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxtodd271
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxtodd271
 

More from todd271 (20)

Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docxRunning head CRIMINOLOGICAL THEORIES  1CRIMINOLOGICAL THEOR.docx
Running head CRIMINOLOGICAL THEORIES 1CRIMINOLOGICAL THEOR.docx
 
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docxRunning head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS  .docx
Running head COMPARATIVE ANALYSIS 1COMPARATIVE ANALYSIS .docx
 
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docxRunning Head Critical Evaluation on Note Taking1Critical Ev.docx
Running Head Critical Evaluation on Note Taking1Critical Ev.docx
 
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docxRunning head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
Running head CRITIQUE QUANTITATIVE, QUALITATIVE, OR MIXED METHODS.docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docxRunning head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
Running head CRIMINAL JUSTICE FLOWCHART1CRIMINAL JUSTICE FL.docx
 
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docxRunning head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
Running head COMPANY OVERVIEW1COMPANY OVERVIEW2Co.docx
 
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docxRunning head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
Running head CRIMINAL BACKGROUND CHECKS 1CRIMINAL BACKGROUND .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docxRunning head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
Running head CRITICAL THINKING ASSIGNMENT1CRITICAL THINK.docx
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docxRunning Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES  .docx
Running Head CRITICAL ANALYSIS OF THE WHISTLEBLOWER INCENTIVES .docx
 
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docxRunning head CRITICAL APPRAISAL OF RESEARCH ARTICLES             .docx
Running head CRITICAL APPRAISAL OF RESEARCH ARTICLES .docx
 
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docxRunning Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
Running Head COMPARATIVE ARGUMENT2COMPARATIVE ARGUMENT2.docx
 
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docxRunning Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
Running Head CREATING A GROUP WIKI1CREATING A GROUP WIKI .docx
 
Running Head CRITICAL ANALYSIS 1 C.docx
Running Head CRITICAL ANALYSIS                      1 C.docxRunning Head CRITICAL ANALYSIS                      1 C.docx
Running Head CRITICAL ANALYSIS 1 C.docx
 
Running head COUNSELOR ETHICS 1PAGE .docx
Running head COUNSELOR ETHICS           1PAGE  .docxRunning head COUNSELOR ETHICS           1PAGE  .docx
Running head COUNSELOR ETHICS 1PAGE .docx
 
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docxRunning Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
Running Head COMMUNICATION TRAINING PLANCOMMUNICATION TR.docx
 
Running head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docxRunning head Commitment to Professionalism1Commitment to Prof.docx
Running head Commitment to Professionalism1Commitment to Prof.docx
 
Running head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docxRunning head COVER LETTER15Cover Lett.docx
Running head COVER LETTER15Cover Lett.docx
 

Recently uploaded

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Running Head CAPSTONE PROJECT .docx

  • 1. Running Head: CAPSTONE PROJECT 1 CAPSTONE PROJECT 7 Recommendations Concerning Security Name Course Professor 10/7/2017 Recommendations Concerning Security Introduction Verbania, Inc., first needs to identify its users and create a community that can be easily identified where its needs will be met and this comes with knowing and understanding their preferences and dislikes (Rampton, 2017). There are psychological factors to be understood in this community as they will be consuming information being provided for them hence the need to define the features and functions based on the community’s quality. Choosing the right technology is key in determining the effectiveness and efficiency of the network that will be used and professionals have to be involved in the evaluation process (Rampton, 2017). Having a structure in place is also important as it requires that customer service, security, and scalability be incorporated to the website or application so that users can be kept longer on the site's activities. Quality activity stream is another aspect of the system that must be developed and it be of great quality so that it can be attractive
  • 2. to the target community. Status update features are critical for a social media network as it increases the chances of users engaging with the site citing that most of them want to express their feelings freely and it makes people to be immediately hooked to them as they are addictive. With these in mind, Verbania, Inc., has to come up with a security plan, security policy and security solution to the social networking Web site and application for quality use by the target community (Rampton, 2017). Security Plan Disaster Recovery Verbania, Inc., should not have any data loss, and thus the importance of having in place a fundamental procedure to define step-by-step measures that should be used so as to make the system or network that was disrupted to recover while the end goal is to initiate normal operations. The recovery plan will be that the IT systems as well as networks be recovered from the disaster by having a set of priorities towards the time factor whereby the normal operations should be reinstated (Kirvan, 2009). In the risk management plan, there could be a situation that might be caused either within the organization, hackers, brought about by an employee’s device or a user and it should be assessed (Kirvan, 2009). This is because it could affect the most critical infrastructure responsible for the day-to-day operations of the system in place. In terms of viability, competitiveness, and financial solidness, the organization has to make sure that the IT system is fully operational (Kirvan, 2009). It is essential to develop the necessary contingency plan policy where it is a statement in which the organization will work manually without the help of the IT system in place to complete the da-to-day business activities. This will help in giving the system’s specialist to identify the areas that need to be analyzed. This will involve the information security officer meeting with the internal IT, applications, as well as networking administrator teams so as to establish a situation that is to be investigated
  • 3. (Kirvan, 2009). Password Creation and Protection Having a strong password protocol will ensure that the system is well-protected from cyber-attacks and this applies to every single component that is used to access and store information (Steinberg, 2011). The information that users provide when signing up could be sensitive to the user hence the need to guard it in the strongest way possible since Verbania, Inc., would want that unique passwords be used as they will identify the users when they want to log in. It implies that when creating the password, it must be strong enough whereby it should “contain numbers, letters and symbols.” (Steinberg, 2011). Remote Access Only authorized employees of Verbania, Inc., will be given access to the social Web site and application system citing that the user information and related data will have to be restricted for security purposes (Sherry, 2008). Routers and Switches Security Verbania, Inc., needs to create and set strong passwords for their routers and switches because the network to be used will be getting a lot of traffic and thus could be exposed to certain network vulnerabilities (Sherry, 2008). Wireless Communication Verbania, Inc., will have to create a system that allows smooth communication with users so that they can be updated with the current information from any location and it must contain network security protocols (Sherry, 2008). Server Security Verbania, Inc., has to encrypt its server citing that it will be storing a lot of sensitive data that can only be accessed by authorized personnel hence it should be stored away from the organization’s premises to guarantee its security (Sherry, 2008). Acceptable Encryption Encryption has to be authorized by the security officers as well as management and it can only be to a given extend because it has to be accessed at given time when necessary. Additionally,
  • 4. the encryption should be set in such a way that a single master file will be stored with the sensitive information (Sherry, 2008). E-mail The e-mail address is the most used information by both users and employees thus the importance of protecting it from access to unauthorized users who might be aiming at steal information about the user or Verbania, Inc., itself (Sherry, 2008). Security Policy Verbania, Inc., will provide many benefits to its user-base while it is assess its risk tolerance scale because the representation of businesses has changed creating a lot of opportunities for benefits, however, monitoring and measuring the risks involved is imperative for the organization (Patel & Jasani, 2010). Direct access to customers will be allowed thus creating an opportunity for the company to take advantage of the opportunity as a monetizing its operations, however, there are problems associated with it as well. Therefore, the way to receive instant feedback from the clients and customers of the company will be critical in expanding its business. Verbania, Inc., will also adopt to the norm of using its platform for hiring and recruiting since information concerning prospective employees will be available for employers to get more information prior to hiring personnel (Patel & Jasani, 2010). Verbania, Inc.’s security policy will follow that: · Employees using the system will not be exempted from privacy when their resources are being used. · Social network and general technology policies will be separated. · Privacy and data security policies will be addressed in length. · The use of social media to attack, bully, harass, discriminate or violate the law is prohibited. · Documenting the policies will be critical in monitoring and implanting them. Security
  • 5. Solution Verbania, Inc., should ensure that when creating an account and a profile, discussion forums and posting and search capability for people, they should all ensure the user information is secured from vulnerable attacks. The gaming component, calendar component for reminders and instant messaging and Voice Over Internet protocol (VOIP)-type calling between friends have to be controlled by the company’s internal systems that notify the users whenever an issue arises with their account so as to keep it secure. Verbania, Inc., should also buy a server that is encrypted and developed with secure account and email feature to ensure that the system’s operations allow or its availability seven days a week. The process of a potential user joining the social networking Web site for the first time should follow that there is a protocol set will policies that can collect, store, back up, and mine user data to better understand users. Furthermore, there have to be algorithms in place that can integrate collected data with customer relationship management (CRM) to improve business and customer support processes. And finally, provide essential tools that have the ability to analyze user patterns, behavior,
  • 6. and generated traffic to present to advertisers. Finally, the social networking application must be built on a system that is strong to allow for account setup and log-in functionality, creating a profile, add or remove friends, and post to discussion area. This should be done autonomously without any hitches. References Kirvan, P., F. (2009 September). Minimizing business risk with disaster recovery audits. TechTarget. Retrieved from http://searchdisasterrecovery.techtarget.com/feature/Minimizing -business-risk-with-disaster-recovery-audits Patel, N., & Jasani, H. (2010). SOCIAL MEDIA SECURITY POLICIES: GUIDELINES FOR ORGANIZATIONS. Issues in Information Systems, Volume XI, No. 1, 2010, pp. 628-634. Rampton, J. (2017, August 25). How to Create Powerful Social Network Platform in 8 Steps. Inc. Retrieved from https://www.inc.com/john-rampton/how-to-create-powerful- social-network-platform-in-.html Sherry, D. (2008, December 12). How to create a security policy for social networks. ComputerWeekly.com. Retrieved from https://www.computerweekly.com/news/2240020792/How-to- create-a-security-policy-for-social-networks Steinberg, S. (2011, July 7). 10 Ways to Keep IT Systems Secure. Entrepreneur. Retrieved from https://www.entrepreneur.com/article/219954