Description
Note : Need Original Paper
Assignment Instructions
Instructions:
You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.
- Pick a site that hosts a social networking functionality other than Facebook. Do not choose Facebook.
- State the site homepage link, and a short description of the site.
- Create a clear description of the ideal visitor to this site by considering the details of these demographic elements:
- Age range
- relationship status
- geographical location
- employment status
- type of employment
- income range
- hobbies
- shopping habits
- surfing habits
- Gender
- Conduct a vulnerability assessment of the site by observation only then answer these questions:
- What are some apparent vulnerabilities?
- What threats are possible on this site?
- What attacks are possible?
- What would be exposed in case there were to be an attack?
- Write an 8-page paper introducing the site, and your findings from the above exercise, and finalizing by giving a clear recommendation for the organization that owns and/or hosts the site?
Submission Instructions: Be sure your paper ALL of the above requirements, and the following formatting requirements:
- 8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.
- Use at least 3 references outside of your textbook (you may use your textbook too, but are not required to).
- In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.
- Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.
- Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!
This assignment has the embedded TurnItIn feature turned on. When you submit the paper, an originality report will be generated. The report must comply with the acceptable originality criteria displayed in the announcements on Academic Honesty in Week 1 of the course.
Explanation & Answer
Attached.
Running head: TWITTER AS A SOCIAL MEDIA SITE AND THE THREATS IT FACES
Twitter as A Social Media Site and The Threats It Faces
Name:
Institution Affiliation:
1
TWITTER AS A SOCIAL MEDIA SITE AND THE THREATS IT FACES
2
Twitter as A Social Media Site and The Threats It Faces
Introduction
Social media can be defined as applications or websites designed to make it possible for
people to interact with each other and share content in a quick, efficient, and real-time manner.
Today, many people started accessing social media through their smartphone applications, but this
type of communication tool started with computers where people could interact with one another,
communicate, and share a different type of communication (Bruce & Jack, 2020). However, as
users engage with each other on these electronic services, they develop highly interactive platforms
where individual persons, organizations, and communities can co-create, share, discuss, and
modify or change user-generated content or self-curated communique what is posted over the
internet. Over the last decade, social media sites have become very popular (Soomro & Hussain,
2020). Today, all social media sites have a combined of over a billion active account users. Active
social media users mean that there are more than a billion social media sites logged in at least once
or twice every two weeks. Others are very active, where the users log in more than once a day.
This shows that this medium of communication has become very crucial in todays way of life.
Some of the most popular social media websites include Facebook, Twitter, Instagram, TikTok,
Weibo, QZone, Tumblr, and LinkedIn. Other platforms are sometimes regarded as social media
services, and they include YouTube, WhatsApp, Reddit, and Snapchat, Pinterest, and Discord
(Bruce & Jack, 2020).
As social media becomes more popular, they tend to be susceptible to cyber threats that
make them very dangerous. These sites are vulnerable, and they can be targeted by attacks
whereby hackers can use illegal means to gain access to a user's social media account and start
sending messages that are meant to deceive, con, or steal from others (Bruce & Jack, 2020). It is
TWITTER AS A SOCIAL MEDIA SITE AND THE THREATS IT FACES
3
imperative to note that many business organizations today rely on social media sites to
communicate with their customers and other stakeholders. These business entities have also been
targeted by hackers and other unauthorized users who gain access to their social media handles.
These handles are sought after as they are the tools that act as data delivery mechanisms for all the
business’s contacts, business activities, and even the location and valuable data regarding the
business entity (Bruce & Jack, 2020). Hackers often use this to gather critical information about
the company to develop misleading targeted advertising campaigns or even to engage in spear
phishing cyber-attacks. These vulnerabilities and attacks have been a signifi...