Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Technology Solution, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Subject of Course Project
Network Security
Business Problem Statement
Since many companies rely on the internet and intraoffice networks to transfer information, it is imperative that they adopt a strict network security policy to protect important documents. Recently, the social media accounts of many businesses have been hacked which indicates that they have a poor level of internet security. In these situations, it is important for information technology professionals to understand that it is possible for employees to gain access to files that they’re not supposed to and hackers from outside the business could gain private information. As a result, it is important to increase security standards to protect this important information and protect against unintended access to business accounts.
On February 18, 2013, someone hacked the Burger King Twitter account as a prank and replaced the Burger King logo with the McDonald’s logo (Manker, 2013). In addition, they posted vulgar tweets, said terrible things about employees, and posted inappropriate videos. It took the company more than an hour to shut down the hacked Twitter feed, which negatively impacted the company’s reputation. While the company responded to this by posting “We apologize to our fans and followers who have been receiving erroneous tweets about other members of our industry and additional inappropriate topics”, the company would have benefitted if it had tighter internet security and the situation could have been prevented altogether.
Name of the Company or Organization
Burger King
Brief Description of Proposed Solution
While it’s difficult to determine whether the hacking was an inside job or done outside of the company, the first step that Burger King needs to take is to ensure that the password for their Twitter account and other social media is difficult to guess. It’s best to use at least one capital letter, numbers, letters, and one symbol in the password to prevent both humans and machines from guessing it. Second, the people in charge of the company’s social media have to have improved protection on their computers. To prevent unauthorized access from within the company, the employees should all have passwords on their computers that follow the format mentioned above. In addition, their sessions should time out after a few minutes in order to ensure that someone isn’t able to use the computer to walk away.
General Benefits it Will Provide the Organization
Social media hacks are bad for the company’s publicity and improved security measures will prevent these kinds of problems from occurring in the future.
Audience to Whom I’m Presenting the Recommendations
The recommendations will be written as if they will be presented to Burger King’s social media and advertising departments. Despite the fact that this report will be written for one specific company, its advice should be followed by other companies who wish to prevent themselves from entering a similar situation. Therefore, any company that uses social media as a method of advertising themselves, which is most, would benefit from regulating their social media passwords and account access more tightly.
References
Manker R. (2013). Burger King Twitter hack: BK latest company in social media spotlight. Chicago Tribune. Retrieved from http://articles.chicagotribune.com/2013-02-19/business/ct-burger-king-twitter-hack-0219-20130218_1_tweets-mcdonalds-hack
Microsoft. (n.d.). Create Strong Passwords. Retrieved from http://www.microsoft.com/security/online-privacy/passwords-create.aspx
van der Aalst, WMP. (2011). Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer.
Villasenor J. (2010). The Hacker in Your Hardware: The Next Security Threat. Scientific American. Retrieved from http://www.scientificamerican.com/article.cfm?id=the-hacker-in-your-hardware
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee