Question Description

Complete Project 1-2 in your textbook with the following modifications [part A and Part B pictures are attached ] (5 pts)

  • http://www.informationisbeautiful.net/visualizatio…
  • Change #13 to your choice (do not use Retail or Government)
    • What is the most common leak (2 pts)
    • Why do think this is the case? (2 pts)
    • Which leak impacted the most amount of people?

List five tools you are using to protect yourself again cyber threats. Provide a two sentence overview of each tool and provide a URL to the tool. (5 pts)

Research your digital footprint, without being specific, what information is available to the public? Provide 5 specific results (Google is not specific) and the provide the procedures to remove your information from the results. (5 pts)

Please submit a SINGLE .pdf file containing your entire submission. The submission must be created using a Word Processor (ie Word, Google Docs, Libre Writer, Pages, etc). No screen captures, handwritten notes or any other format will be accepted.

Complete Project 1-2 in your textbook with the following modifications [part A and Part B pictures are attached ] (5 pts)http://www.informationisbeautiful.net/visualizatio…Change #13 to your choice (do not use Retail or Government)What is the most common leak (2 pts)Why do think this is the case? (2 pts)Which leak impacted the most amount of people?List five tools you are using to protect yourself again cyber threats. Provide a two sentence overview of each tool and provide a URL to the tool. (5 pts)Research your digital footprint, without being specific, what information is available to the public? Provide 5 specific results (Google is not specific) and the provide the procedures to remove your information from the results. (5 pts)Please submit a SINGLE .pdf file containing your entire submission. The submission must be created using a Word Processor (ie Word, Google Docs, Libre Writer, Pages, etc). No screen captures, handwritten notes or any other format will be accepted.