Title
Running Head: GOVERNMENT REGULATION 1
GOVERNMENT REGULATION 3
Government regulation
Professors name:
Students name:
Date
Yes, the government should undertake a closer regulation on Facebook. Research has established that various officials have been able to make a recommendation to the government with subject to the regulation of social media with the inclusion of Facebook. Mark Zuckerberg, the Facebook CEO, has called on the government with subject to inputting stringent internet regulations. This is with the inclusion of various areas that comprise of privacy, harmful content, data portability, and election integrity. This has been identified as the four most significant scandals associated with Facebook(Tan, 2018).
The Facebook platform has been employed in most cases subject to the spread of misinformation, necessitating the government’s need to undertake the regulation of this platform. The rate by which the concept of lies is spread over the Facebook platform has been established to be too high in the recent past; hate speech has considerably been associated with Facebook. On the other hand, Facebook has always been faced with difficulties subject to the identification of political advertising; thus, the government has the mandate of regulating them, subject to guiding this platform in the determination of the aspect of political advertising(Mangan & Gillies, 2017).
On the other hand, the freedom of speech is protected by the constitution and the federal government, and thus, the regulation of Facebook would be a hindrance and unconstitutional subject to the aspect of freedom of speech. Again, Facebook is mandated with a critical innovation goal subject to customers’ satisfaction; therefore, the Regulation of Facebook would translate to a different goal with regards to its real intention. Thus, there will be difficulties exhibited subject to government close Facebook regulation, and the only way to make this a success is through the involvement of Facebook users(Brown & Marsden, 2013).
References
Brown,I., & Marsden,C.T. (2013).Regulating Code: Good governance and better regulation in the Information Age. MIT Press.
Mangan,D., & Gillies,L.E. (2017).The legal challenges of social media. Edward Elgar Publishing.
Tan,C. (2018).Regulating content on social media: Copyright, terms of service, and technological features. UCL Press. Running Head: REPUBLICAN PARTY 1
REPUBLICAN PARTY 4
Republican Party
Professors name:
Students name:
Date
The risk analysis assessment concept entails the process that helps with the management and identification subject to potential factors that are attributed to undermining significant business initiatives. There is the application of a variety of methods with subject to the concept of risk assessment with the inclusion of the what-if analysis with regards to the identification of the potential threats, applying checklists subject to threats that are known, checklists and what-if analysis combination alongside HAZOP application subject to potential hazards identification(Smith, 2011).
Website security is significantly elaborated as the applied measures subject to enhancing website security against cyber-attacks. The significance attached to the aspect of website security is on the aspect that no individual would want their website to be attacked. The Republican Party website is prone to attacks from hackers and cybercriminals. The attacks will be in the form of LFI/RFI attacks, XXS, and SQL injection. The attacks have the possibility of being carried out prior to the elections with the objective of making sure the Republican Party ends up losing the general election. A variety of attacks might be undertaken with subject to the Republican Party website with the inclusion of the IP theft, translating to hindrances on the aspect of long-term growth, ransomware, cybercrime, and infrastructure attacks. The attacks’ overall motive entails stealing and compromising the details of the members of the Republican Party and the voters(Stolfo, Stavrou, & Wright, 2013).
The aspect of website security is an ongoing process subject to being the primary component on the basis of website management. Various approaches can be enhanced to mitigate these attacks and enhance website security with the inclusion of encryption such as SSL certification with subject to data encryption during transit, software updates, antivirus updates, physical access components access, changing passwords regularly, Wi-Fi networks security, and making backup copies(Nahari & Krutz, 2011).
References
Nahari,H., & Krutz,R.L. (2011).Web commerce security: Design and development. John Wiley & Sons.
Smith,R.E. (2011).Elementary information security. Jones & Bartlett Publishers.
Stolfo,S.J., Stavrou,A., & Wright,C.V. (2013).Research in attacks, intrusions, and defenses: 16th international symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, proceedings. Springer. Running Head: PENETRATION TECHNIQUES 1
PENETRATION TECHNIQUES 4
Penetration techniques
Professors name:
Students name:
Date
The aspect of penetration testing designing is undertaken with the fundamental aspect of establishing vulnerabilities based on a network. Thus, this can be described as a pen test which is established as being similar to vulnerability assessment with the fundamental distinction being the fact that pen test enhances the presentation of exact simulation subject to potential attacks subject to vulnerabilities identification established as complicated with regards to being located and established subject to a network. The widely employed network penetration includes wireless networks, social engineering, physical testing, web application security tests, and network penetration testing and exploitation. Various techniques applied include wireless testing, information gathering, identification of vulnerability, network mapping alongside the web application techniques with subject to the aspect of penetration testing(EC-Council, 2010).
The primary objects with regards to undertaking network penetration testing are attempting the breakage of a security system. Hence, the most significant advantage attributed to network penetration testing can be established to monitor and improve information security programs. The advantage of network mapping is attributed to easy inventory tracking, myriad association with other applications, and host uptime and downtime monitoring. The disadvantage associated with network mapping is it’s highly prone to vulnerabilities. The advantage of vulnerability identification technique is that it promotes vulnerability identification chances before identification by cybercriminals; the benefits, on the other hand, entail false positives; thus, individuals don’t end up establishing every other vulnerability. The advantage of information gathering is that it enhances the provision of useful data without being subjected to reviews, while consequently, it has drawbacks associated with data collection. The advantage of wireless testing is the fact that it entails convenience subject to network testing though it is subject to lack of mobility and high-cost implications(Allsopp, 2017).
On and off-site social engineering techniques with regards to the aspect of social engineering are established, being among the most notable aspects of social engineering. Thus, the probable positive implications include high-risk weakness identification resulting from a combination of smaller vulnerabilities, identification of various vulnerabilities, and the provision of specified recommendations. On the other hand, the negative implications entail great damage attributed to penetration testing subject to being conducted inappropriately, trust requirement subject to the penetration tester, and misleading results subject to the application of realistic test conditions(EC-Council, 2010).
References
Allsopp,W. (2017).Advanced penetration testing: Hacking the world’s most secure networks. John Wiley & Sons.
EC-Council. (2010).Penetration testing: Network threat testing. Cengage Learning.
EC-Council. (2010).Penetration testing: Procedures & methodologies. Cengage Learning. Running Head: FACEBOOK REGULATION 1
FACEBOOK REGULATION 2
Facebook Regulation
Students Name
Professors Name
Date
Discuss in 300 words whether the government should regulate Facebook more closely
The rapid development and adoption of technology have made mobed most of the individual activities online, from work, leisure to social interactions. Social media platforms like Facebook have gained huge acceptance to become the most popular platform. Facebook has become a center for free speech where individuals are free to express their opinions on matters of interest. Individuals, organizations, and governments are all concentrated in one place, Facebook. However, several accusations relating to privacy, fake news, radicalization, among others, have brought various agencies in the undergrowth of whether activities in this mass communication platform should be closely regulated (Tan, 2018).
Facebook has led to a set of problems that are significantly affecting the society in many ways. There have been no boundaries to what someone can post, leading to inappropriate posts and images that are hell-bent on ruining the moral fabric of the society. Many children and teeners have been bullied on Facebook, leading to rising mental health cases and suicides. It has also been established that the company disregards safeguarding the right thing for a chase for-profit adventure. A good example is the 2016 Cambridge Analytica scandal that exploited millions of people’s confidential information to influence the democratic governance process. Fake news is on the rise, yet the company mostly waits for people to see the contents and complain to have it remove that content. Thieves and criminals have turned to Facebook to execute their activities. They are using fake identities and publications to exploit innocent citizens, yet the company is doing very little if any attempt to stop this (Curwen, 2018).
Though I greatly support the need to protect free speech, a rigid boundary needs to be defined to counteract this weapon that is destroying society. Our youths are being radicalized to join terrorist groups, terrorism and robbery are being planned on Facebook, politicians are inciting the public to violence or using it to influence election outcomes, and the list can move on and on. Like what the company proprietor, Mark Zuckerburg, suggested, there is a need for government to bring order and sobriety that is a thing of the past for Facebook (Delamare, 2018). We can no longer ignore this wound lest; the pain will hurt and kills us!
References
Curwen,P. (2018). Facebook.Digital Policy, Regulation, and Governance,20(4), 369-370.https://doi.org/10.1108/dprg-03-2018-0012
Delamare,G.H. (2018). Zuckerberg holds the line on Facebook regulation.Emerald Expert Briefings.https://doi.org/10.1108/oxan-es232057
Tan,C. (2018).Regulating content on social media: Copyright, terms of service, and technological features. UCL Press. Running Head: RISK ASSESSMENT ANALYSIS 1
RISK ASSESSMENT ANALYSIS 2
Risk Assessment Analysis
Students Name
Professors Name
Date
Risk Assessment Analysis for RepublicanParty National Committee Website
this risk assessment analysis will analyze the potential vulnerability of the Republican Party National Committee website, the likelihood, the type of attack, and the mitigation strategies to be put in place to secure the website.
The democrats and their supporters and sympathizers are the main people that are likely to attack our website. They may want crucial information on our party strategies to secure the forthcoming elections. They may also be interested in analyzing our communications and strategies to find weaknesses that they may use to win the electorates to their side. Some democrats sympathizers may like to revenge the 2015/2016 cyber attack on their national committee website that they blamed on the republic sympathizer country, Russia. Besides, other criminals may also like to attack the website to solicit money from the party or sell it to our rivals. This period preceding November polls is the prime time for such attacks. It is the time parties are pinning down their strategies and plans. The attackers would also likely instigate an attack at night when little monitoring is in place (Marylin, 2020).
Among the exposed attacks is the man in the middle attack where the criminals insert themselves between the server and client communication. It may take the form of service hijacking where the attacker engages the servers disguised as a client, IP spoofing, and replay. Phishing is also another common attack where an attacker tricks users into providing sensitive information through an email appearing to be from trusted sources. Also, SQL injection attacks, denial of service attacks, and distributed denial of service attacks may be used (Walsh, 2020).
To secure the servers, the party needs to install security plugins like iThemes Security, fail2ban, amasty, RSFirewall, antivirus website protection, among others that counters any hacking attempt. Also, the party should emphasize the use of HTTPS always to secure sensitive information from hackers. The website software and platforms should be updated with the latest security patches and users trained on using the secure password and identifying hackers’ tricks (Marylin, 2020).
References
Marylin,B.B. (2020). The risk analysis process: Risk assessment Analysis.Risk Analysis, 39-49.https://doi.org/10.1002/9780470694435.ch4
Walsh,N. (2020, August 18).The RNC data exposure: Learnings and actions to take. Threat Stack.https://www.threatstack.com/blog/the-rnc-data-exposure-learnings-and-actions-to-take Running Head: NETWORK PENETRATION TESTING TECHNIQUES 1
NETWORK PENETRATION TESTING TECHNIQUES 2
Network penetration testing techniques
Students Name
Professors Name
Date
Network penetration testing techniques
Penetration testing involves testing a computer, network, or application system to identify weaknesses that unauthorized individuals may use to exploit, change, or access a system /network. There are a number of penetration testing techniques. One such technique is internal network penetration testing used to assess the vulnerability of the organization once the attacker has gained initial access or compromised the system. The testing is quite useful as it reveals the data at risk to device ways to secure it. An external network penetration test, on the other hand, assesses the organization’s perimeter defenses from an attacker with no access or permission, looking to compromise the system. It allows the organization to assess how susceptible they are to outside threats (Lehtinen & Sr., 2016).
the third test is the blind test, where the tester is provided with very limited information about the organization like the company website or name. The test aims to stimulate the behavior of a real cybercriminal making the organization understand what ways real cybercriminals may use to compromise the system. However, the test is expensive and time-consuming, as many efforts are required to identify the target. Another test is the double-blind testing, which is an advanced blind test where only very few people are made aware of the upcoming test. It is useful to assess the effectiveness of organization incident monitoring, identification, and response. the last technique is the targeted testing, which is executed by organizations IT personnel where those affected are informed in advance. The method is faster than blind testing, useful in assessing the system, and installing several security patches but does not assess the organization’s security vulnerabilities and preparedness (Chapman, 2016).
Social engineering tests involve the tester tricking the organization staff into performing actions that compromise system security or revealing sensitive data. Impersonation is a notable test where an individual disguises as another individual to acquire unauthorized information or unauthorized access locations (Allsopp, 2017).
In case the penetration testing is not executed properly, they can result in enormous damage like corrupting operational / production data, exposing sensitive information, crash servers, etcetera. In case the tester is not trustworthy, they may abuse their knowledge and skills to become real hackers later. The testing veers off the real attack situation, which bears no warning, making the testing results misleading (Chapman, 2016).
References
Allsopp,W. (2017).Advanced penetration testing: Hacking the world’s most secure networks. John Wiley & Sons.
Chapman,C. (2016). Testing for security flaws using penetration testing.Network Performance and Security, 153-193.https://doi.org/10.1016/b978-0-12-803584-9.00006-8
Lehtinen,R., & Sr.,G.G. (2016).Computer security basics: Computer security. O’Reilly Media.