Analysis of Information Assurance Risk Report: Facebook

Verified

Added on  2023/01/06

|13
|528
|49
Report
AI Summary
This report provides an overview of the information assurance risks associated with Facebook. It begins by outlining the context of Facebook, including its founding and core functions. The report identifies several key risks, such as third-party data sharing, privacy setting vulnerabilities, malware in advertisements, fake profiles, and the potential for hacking. It then details a risk management lifecycle, including planning, building, and operating phases. The report also lists methodologies, like classical system life cycle and data modelling, and outlines the RMF framework. It examines Facebook's policies regarding data collection, privacy, and content review, and suggests audit and testing schedules to mitigate risks. The report concludes by emphasizing the importance of proactive risk management in maintaining user trust and data security on the platform.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Information
Assurance Risk
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Facebook
Founded in the year 2004 by Mark
E.Zukerberg (Bechmann, 2014).
It is a social networking website.
It aims in providing people the power to
connect with the world.
Facebook provides free service where
people can share pictures, personal
information, messages and videos.
Document Page
IT Risk Faced by
Facebook
The information is shared by the third parties.
The privacy setting reverts back to a less safe
default mode.
Facebook ads may contain different malware
(Douglas, 2013).
Scammers are able to make fake profiles.
The personal information are not saved.
Hackers can easily hack the account of the users.
Document Page
Risk Management Lifecycle
Business
Requirement
Plan
Source/Build
Provision
Deliver/Operate
Cost/Recovery
Report
Manage
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Justification of the Risk
Wrong justification of the data due to the difficulties.
Legal risks.
Security related threats.
Invasion of the privacy (Thieme, Utne & Schjølberg,
2015).
Social media related fraud.
Risk to the users related to fraud and privacy violations.
Document Page
Methodologies
Classical System Life cycle.
Data Modelling.
Object Oriented Analysis.
Structures Systems Development.
Document Page
RMF Framework
Identify
Measure
ManageMonitor
Report
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Structure
Image 1: Facebook Architecture (Source: Van Dijck, 2013).
Document Page
Policies Used by Facebook
Facebook collects all the data about everything
the user share.
Facebook promises to maintain the privacy of the
information of the users.
Facebook ads policies allows the page to check
the ads which are acceptable by the sites.
Facebook content review policy is related to the
content available in the Facebook (Van Dijck,
2013).
Document Page
Audit
Schedules
Profile Information.
Engagement Metrics.
Publishing Metrics.
Audience Demographics.
Referral traffic.
Channel specific metrics.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Testing schedules
The steps involved are as follows:-
Organize and prioritise.
Indulge in layering.
Monitor the writing style and tone.
Perform small as well as large scale testing.
Test the content of the page.
Test whether people can use and understand the application.
Document Page
References
Bechmann, A. (2014). Non-informed consent cultures: Privacy policies and app contracts on Facebook. Journal of
Media Business Studies, 11(1), 21-38.
Douglas, M. (2013). Risk and acceptability. Routledge.
Thieme, C. A., Utne, I. B., & Schjølberg, I. (2015, May). A risk management framework for unmanned underwater
vehicles focusing on human and organizational factors. In ASME 2015 34th International Conference on Ocean,
Offshore and Arctic Engineering (pp. V003T02A075-V003T02A075). American Society of Mechanical Engineers.
Van Dijck, J. (2013). ‘You have one identity’: performing the self on Facebook and LinkedIn. Media, culture &
society, 35(2), 199-215.
Document Page
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]