Check theGoogleproposal outline and add and edit the Google proposal outline draft. also check forgrammaticalerror. So you will be sending me back your edited version. Also underline whatever youeditedor added
</o:p>
Document Preview:
Google Risk Assessment Report – Project Proposal Google, founded in 1998 by Larry Page and Sergey Bin, provides internet-related services and products. Its name was inspired by the mathematical term googol, equal to. The most popular of its services is the Google Search engine. Since its inception, Google has given the world more effective and innovative ways to conduct searches.When it comes to the war between numerous search engines on web, Google captures a major market share of 67%.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted Its mission is to organize the world’s information and make it universally accessible in the most useful formats. Based on results from ComScore’s recent monthly analysis, there were a total of 19.4 billion explicit core searches in July 2013, with Google ranking first at around 13 billion searches out of the whole. Like many of its competitors Google uses algorithms, automated programs and a large keyword index to generate search results. Google differentiates itself with its trademark PageRank algorithm, which determines the order of its search results. As an internet based service, its source code is vulnerable and subject to numerous attacks. The scope of our project is concerning Google’s key business segment, its search engine and its vulnerabilities as it pertains to its users and its infrastructure. Google’s global presence and popularity has deemed it a prime target for hackers. Data management is a key factor to Google’s Search engine success;Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted in order for Google to be an efficient search engine it requires access to users’ data, so it can store and analyze search trends; unauthorized access to this large amount of data is a huge risk for Google and its users. It is our aim to categorize assets, identify threats and corresponding vulnerabilities and provide an assessment of the risks to Google’s search engine. Our research will explore Google’s reaction to its vulnerabilities and security threats, as well as, information gathered via the internet from...
Attachments:Click here for more on this paper.......
Section 1 - About Google and its search engine:
When it comes to the war between numerous search
engines on web, Google undoubtedly captures a major market share of 67%. It is
essentially because Google follows its mission to organize the world’s
information and make it universally accessible in the most useful formats.
Google browses through web pages and builds indexes for them, thus helping the
user with what it is seeking. Google returns most relevant results and is
convenient as it keeps the sponsored links separate from the search results.
From the data shown from recent ComScore’s monthly analysis, there was a total
of 19.4 billion explicit core search in July’ 2013, with Google ranking first
bagging around 13 billion search out of the whole alone. Click here for more on this paper.......
Section 2 – Why did we choose Google’s Search engine
business segment:
1.
Risk
assessment is measurement of probability of a risk becoming a reality for a
business. The main reasons behind Google being my topic of risk assessment are:
a. Very few companies have a global
presence of the level of Google’s market hold. Any other brand or company would
have a localized customer base and much lesser reach as compared to Google.
b. Google’s business extends itself
beyond the boundaries of caste, color and creed. Thus, understanding,
evaluating and strategizing risk for Google can give a researcher a thorough
grasp on the subject of risk assessment.
c. A risk assessment framework involves
categorizing assets, identifying threats and corresponding vulnerabilities,
prioritizing potential risks and determining action towards them. With Google,
such a framework fits the organization’s business requirements.
Section 3 – Research Methods:
1.
For
a successful research on the said topic, two main methods shall be used:
a. Primary Research
A
small survey shall be conducted on social networking websites related to use of
Google search engine.
b. Secondary Research
Inferences
from other sources of information such as published journals, newspaper
articles, reports from international information technology companies etc.
shall be used.
Section 4 – Articles & Sources of Information:
a. http://searchenginewatch.com/article/2289560/Googles-Search-Market-Share-Shoots-Back-to-67
framework-RAF
2ND–
Collaborative Draft Outline-Google Proposal
Section 1 -
About Google and its search engine:
Google was
founded in 1998 by Larry Page and Sergey Bin while attended Standard
University. Two years before, Page and Bin began to collaborate on the design
of a search engine called BackRub.
BackRub was operated on Stanford University’s servers for more than a
year eventually it has to be removed because it was a strain on the
servers. In 1997, Page and Bin decided
to rename BackRub to Google which was inspired by the mathematical term googol
which is equal to
. Since its inception, Google has given the world more
effective and innovative way to conduct entire searches. It is the leading
search engine website, and its main business is based on advertising along to
internet search results. Being on the
internet, Google search engine source code is vulnerabilities and subject to
multiple attacks.
Section 2 –
Google’s Search engine Risk Assessment:
Google is one
the leading search engine in the world, it is web based search engine is the
most popular because of its ingenuity and innovation. The presence of its
search engine across the Globe has made its available for attacks. This risk
assessment will assess Google search engine vulnerabilities for its users and
its own infrastructures.
Section 3 –
Research Methods:
The
research will explore Google reaction to its vulnerabilities and security
threats. The risk assessment report will include qualitative and quantitative
research methods. The research will gathers public materials about Google which
are ready available on the Internet. All the referenced works will be cited
according to APA style format.
Section
4 – Articles & Annotated Bibliography
Thomas,
L.T (2010). Google Confronts China’s
“Three Warfares”. Retrieved from
http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/2010summer/thomas.pdf
This article
analyses the context in why Google was successfully attached by hackers
originated from china and how Google’s responded. It proceeds on showing that
was not able to able to protect its users or its infrastructure. The attackers
succeeded in penetrating elaborate computer security systems and obtaining
crucial corporate data and software source codes. The exfiltration operation
relied upon previously stolen valid user accounts to breach the company’s
internal servers. This article was written by Timothy L. Thomas who is an
analyst at the Foreign Military Studies Office (FMSO) at Fort Leavenworth,
Kansas. The author work references several works and is unbiased. The article
discusses an issue that is relevant in today society, Google’s vulnerabilities,
threats, security risk. These topics are relevant for my research.
Google (2013).Vulnerability Reward
Program. Retrieved from
http://www.google.com/about/appsecurity/reward-program/
This
article is about the effort that Google is deploring in order to protect its
infrastructure and its users. Google knows that its systems have
vulnerabilities and it prefers that these are discovered by its own hackers. To
encourage these external contributions, Google has established a Vulnerability
Reward Program for Google-owned web properties and qualifying bugs range from
$100 to $20,000. Any issue that
substantially affects the confidentiality or integrity of user data is covered
by the program such as cross-site scripting, cross-site request forgery,
mixed-content scripts authentication and server-side code execution bugs. This
article was written by Google, it shows that Google is conscious that it is
under constant attack but it wants the limit the numbers of vulnerabilities
which can be discovered by hackers. These topics are relevant for my research.
3ND – Collaborative Draft Outline -Google Proposal
Section 1 - About Google and its search engine:
Google, founded in 1988, provides
internet-related services and products.
Its key business segment is the Google search engine. The Google search engine is the most used
search engine in the world, allowing people to search the web for information
with ease.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted Like many of its competitors
Google uses algorithms, automated programs and a large keyword index to
generate search results. Google
differentiates itself with its trademark PageRank algorithm, which determines
the order of its search results.
Section 2 – Why did we choose Google’s Search engine business segment:
Data management is a key factor
to Google’s Search engine success. In
order for it to be an efficient search engine it requires access to users’
data, so it can store and analyze search trends; unauthorized access to this
large amount of data is a huge risk for Google and its users.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted The risks associated with and the mitigation
tactics employed by Google is what led to the selection of Google’s search
engine business segment.
Section 3 – Research
Methods:
Research will be done via the internet from resources such
as the Google website, information security magazines and regulatory
organizations.
Section 4 – Articles
& Sources of Information (w/brief description):
Site provides information on how
search works, crawling & indexing, algorithms, fighting spam, and policies
(i.e. Removal Policies).
An intro to Google’s data centers,
its security management tactics and link to a white paper on Security. Click here for more on this paper.......
Google
Risk Assessment Report – Project Proposal
Google,
founded in 1998 by Larry Page and Sergey Bin, provides internet-related
services and products.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted Its name was
inspired by the mathematical term googol, equal to
. The most popular of its services is the
Google Search engine.
Since
its inception, Google has given the world more effective and innovative ways to
conduct searches. When it comes to the
war between numerous search engines on web, Google captures a major market
share of 67%.Its mission is to organize the world’s information and make it
universally accessible in the most useful formats. Based on results from ComScore’srecent
monthly analysis, there were a total of 19.4 billion explicit core searches in
July 2013, with Google ranking first at around 13 billion searches out of the
whole. Like many of its competitors
Google uses algorithms, automated programs and a large keyword index to
generate search results.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted Google
differentiates itself with its trademark PageRank algorithm, which determines
the order of its search results. As an
internet based service, its source code is vulnerable and subject to numerous
attacks.
The
scope of our project is concerning Google’s key business segment, its search engine
and its vulnerabilities as it pertains to its users and its
infrastructure. Google’s global presence
and popularity has deemed it a prime target for hackers. Data management is a key factor to Google’s
Search engine success;in order for Google to be an efficient search engine it
requires access to users’ data, so it can store and analyze search trends;
unauthorized access to this large amount of data is a huge risk for Google and
its users.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted It is our aim to categorize
assets, identify threats and corresponding vulnerabilities and provide an
assessment of the risks to Google’s search engine.
Our
research will explore Google’s reaction to its vulnerabilities and security threats,as
well as, information gathered via the internet from published journals,
magazine articles, international technology companies and regulatory
organizations. It is our intention to
use both quantitative and qualitative research methods to produce a
well-rounded assessment of risky environment.
All the referenced works will be cited according to APA style format.
Annotated Bibliography:
Thomas,
L.T (2010). Google Confronts China’s
“Three Warfares”. Retrieved from
This
article analyses the context in why Google was successfully attached by hackers
originated from china and how Google’s responded. It proceeds on showing that
was not able to able to protect its users or its infrastructure.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted The attackers
succeeded in penetrating elaborate computer security systems and obtaining crucial
corporate data and software source codes. The exfiltration operation relied
upon previously stolen valid user accounts to breach the company’s internal
servers. This article was written by Timothy L. Thomas who is an analyst at the
Foreign Military Studies Office (FMSO) at Fort Leavenworth, Kansas. The author
work references several works and is unbiased. The article discusses an issue
that is relevant in today society, Google’s vulnerabilities, threats, security
risk. These topics are relevant for my research.
Google
(2013). Vulnerability Reward Program. Retrieved from
This
article is about the effort that Google is deploring in order to protect its
infrastructure and its users. Google knows that its systems have
vulnerabilities and it prefers that these are discovered by its own hackers. To
encourage these external contributions, Google has established a Vulnerability
Reward Program for Google-owned web properties and qualifying bugs range from
$100 to $20,000. Any issue that substantially affects the confidentiality or
integrity of user data is covered by the program such as cross-site scripting,
cross-site request forgery, mixed-content scripts authentication and
server-side code execution bugs.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted This article was written by Google, it shows
that Google is conscious that it is under constant attack but it wants the
limit the numbers of vulnerabilities which can be discovered by hackers. These
topics are relevant for my research.
Google.
Inside Search. Retrieved from
This section of Google’s website provides information on the inner
workings of its search engine. It is a
valuable resource in understanding the various processes involved in the search
process. It reviews the process of crawling to gather
information, indexing to sort information, choices available to website owners
to restrict access and various phases of the search process. Additionally the role of algorithms in
producing search results and processes involved in filtering out spam are
explained. Policies concerning
exceptions listing to prevent unauthorized access to minors, fighting spam,
phishing websites and malware, transparency for webmasters and preventing
identity threats so personal information is not compromised. Understanding how search works will be
critical in assessing the potential risks faced by the search engine.
Google (2011). Security
WhitePaper: Google Apps Messaging and
Collaboration Products. Retrieved from: http://www.google.com/about/datacenters/inside/data-security/index.html
This security white paper by Google, addresses the various processes in
place to guarantee security to the many facets of Google’s services. Its organizational security section reviews
information security, physical security, global internal audit and global
compliance.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted The asset classification and
control section provides information on access, deleted data and media disposal. The operational security section provides
information on malware prevention, security monitoring program, vulnerability
management, incident management, network security and operating system
security. Additionally the access
control section of the paper discusses authentication controls and
authorization controls. All of which are
important factors in Google’s ability to carry out its services and protect
itself and its users.
http://searchenginewatch.com/article/2289560/Googles-Search-Market-Share-Shoots-Back-to-67
No comments:
Post a Comment