Shopping Cart
0 item(s) - $0.00
Your shopping cart is empty!
CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network
$5.00

CYB 110 Week 3 Individual Social Network Security – Configuring a Social Network

This Tutorial was purchased 9 times & rated A+ by student like you.

 

Attachment

  • CYB 110 Week 3 Individual Social Network Security Configuring a Social Network.docx

CYB 110 Week 3 Individual: Social Network Security – Configuring a Social Network
Your company encourages its employees to interact with the corporate Facebook page as a way to promote brand awareness and customer engagement. Your company wants employees to verify that their social media accounts are secure before engaging with a public corporate Facebook page that has thousands of users. Your task is to create a reference document demonstrating appropriate secure settings for Facebook.
Configure Facebook security settings as described, taking screenshots for each step:
1. Limit access to Work and Education info to “Friends” or “Only me.”
2. Set a strong password consisting of a passphrase that is alphanumeric, at least 10 characters, and includes a special character.
3. Select a separate “App Password” under Security Settings.
4. Adjust “Privacy Settings” to Friends.
5. Limit “Who can contact me” to “Friends of Friends” or “Friends.”
6. Adjust “Who can look me up” to “Friends of Friends” or “Friends.”
7. Set “Timeline and Tagging” to “Friends.”
8. Apply “Always Play Anonymously.”
9. Adjust “Ad Settings” to “No One.”
Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.
Submit your assignment using the Assignment Files tab.
 

Write a review

Order Id


Order Id will be kept Confidential
Your Name:


Your Review:
Rating:   A   B   C   D   F  

Enter the code in the box below:



Related Tutorials
$5.00

This Tutorial was purchased 9 times & rated A by student like you.

CYB 110 Week 1 Individual Protecting Data There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks. Cr....
$5.00

This Tutorial was purchased 11 times & rated A+ by student like you.

CYB 110 Week 1 Individual Security Policies You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data. Write a 1- to 2-page recommendation paper outlining methods the company should consider to pro....
$5.00

This Tutorial was purchased 9 times & rated A by student like you.

Individual Risk Management Framework and CIA In Ch. 1, "Introduction to Information Security," of Elementary Information Security, you read about National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) and how it expands on the CIA concepts. Assume that a sec....
$5.00

This Tutorial was purchased 7 times & rated A+ by student like you.

CYB 110 Week 2 Individual Securing an Operating System You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your ....
$5.00

This Tutorial was purchased 8 times & rated A+ by student like you.

CYB 110 Week 2 Individual Configuring Anti-Virus Software You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software....
$5.00

This Tutorial was purchased 4 times & rated A by student like you.

CYB 110 Week 4 Individual: Configuring Security on Mobile Devices Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices instead of purchasing corporate mobile devices for employees and contractors. As the ....
$5.00

This Tutorial was purchased 5 times & rated A+ by student like you.

Individual Configure Backup Settings You want to ensure your personal computer is set to save data on a daily basis. Using OneDrive configure a personal computer to save and maintain data. Configure backup settings as described below, taking screenshots to demonstrate your knowledge: ....
$5.00

This Tutorial was purchased 6 times & rated A+ by student like you.

Individual Disaster Recovery and Business Continuity Plan You work for a multi-state company with three sites in three different states, 1,000 employees, an ERP application with a backend database, and two datacenters. Prepare a 2- to 2.5-page Disaster Recovery and Business Contin....
$5.00

This Tutorial was purchased 8 times & rated A by student like you.

Individual Run/Playbook Part 1 Malware Create the first section of your Playbook/Runbook. This week you researched malware, attack vectors, and how they are related to cybersecurity. Write a 1- to 2-page scenario in which a malware attack occurs. Include the following:   &nbs....
$5.00

This Tutorial was purchased 11 times & rated A+ by student like you.

Individual Playbook/Runbook Part 2 Social Network Security Add a 1- to 2-page section to your Playbook/Runbook that includes the following:       • List of information and data employees are not to place online       • Guidelines for interacting online ....
$5.00

This Tutorial was purchased 11 times & rated A+ by student like you.

Individual Runbook/Playbook Part 3 Network, Mobile Device, and Cloud Services Guidelines Add a 1- to 2-page section to your Playbook/Runbook. Create a prescriptive section of your Playbook providing guidelines to secure each of these areas:     • Network connections &nbs....
$5.00

This Tutorial was purchased 6 times & rated A+ by student like you.

Individual  Playbook/Runbook Part 4 Secure Data Backup Guidelines NOTE: Only Part 4 is Included - Part 1, 2, & 3 Not Included.   Add a 1- to 2-page section to your Playbook/Runbook. Outline guideline policies and procedures to back up and secure your company's data. ....
$35.00

This Tutorial was purchased 18 times & rated A+ by student like you.

CYB 110 Week 1 Individual Protecting Data   CYB 110 Week 1 Individual Security Policies   CYB 110 Week 1 Individual Risk Management Framework and CIA   CYB 110 Week 2 Individual Securing an Operating System   CYB 110 Week 2 Individual Configurin....
Tags:
snaptutorial © 2019
Powered By Snap Tutorial