Internet Security and Internal Controls

Internet Security and Internal Controls

Could you please assist me with my discussion questions?

“Online Predator Threats” Please respond to the following:

  • Suppose, you have been selected by your school to write a news bulletin on steps that parents can take in order to protect their children against online predators. Highlight the most important items a parent should know and what they can do to protect their child.
  • From the previous scenario, suggest three tools that can be used to safeguard children along with three assessments that parents can perform in order to determine their level of threats.

“Online Harassment and Identity Theft” Please respond to following:

  • From the e-Activity, compare and contrast at least two tools that can be used to minimize online harassment and identity theft.
  • Outline the various features that these tools provide.  Give an example on how this tool can be effective for online users.  Describe any accolades or awards these tools have received.
“Internal Controls”  Please respond to the following:
  • Discuss internal controls in small, medium, and large companies and suggest five options for implementing the internal controls in each environment.
Answer Preview
Online predators are people that look for children online in an effort to manipulate them and get sexually involved with the children. This is something that happens for both male and female children who may be very unsuspecting in real sense…
(987 Words)
Scroll to Top