Thursday, 27 March 2014

Check theGoogleproposal outline and add and edit the Google proposal outline draft. also check forgrammaticalerror. So you will be sending me back your edited version. Also underline whatever youeditedor added

Check theGoogleproposal outline and add and edit the Google proposal outline draft. also check forgrammaticalerror. So you will be sending me back your edited version. Also underline whatever youeditedor added
</o:p>
Document Preview:
Google Risk Assessment Report – Project Proposal Google, founded in 1998 by Larry Page and Sergey Bin, provides internet-related services and products. Its name was inspired by the mathematical term googol, equal to. The most popular of its services is the Google Search engine. Since its inception, Google has given the world more effective and innovative ways to conduct searches.When it comes to the war between numerous search engines on web, Google captures a major market share of 67%.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted Its mission is to organize the world’s information and make it universally accessible in the most useful formats. Based on results from ComScore’s recent monthly analysis, there were a total of 19.4 billion explicit core searches in July 2013, with Google ranking first at around 13 billion searches out of the whole. Like many of its competitors Google uses algorithms, automated programs and a large keyword index to generate search results. Google differentiates itself with its trademark PageRank algorithm, which determines the order of its search results. As an internet based service, its source code is vulnerable and subject to numerous attacks. The scope of our project is concerning Google’s key business segment, its search engine and its vulnerabilities as it pertains to its users and its infrastructure. Google’s global presence and popularity has deemed it a prime target for hackers. Data management is a key factor to Google’s Search engine success;Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted in order for Google to be an efficient search engine it requires access to users’ data, so it can store and analyze search trends; unauthorized access to this large amount of data is a huge risk for Google and its users. It is our aim to categorize assets, identify threats and corresponding vulnerabilities and provide an assessment of the risks to Google’s search engine. Our research will explore Google’s reaction to its vulnerabilities and security threats, as well as, information gathered via the internet from...
Section 1 - About Google and its search engine:
When it comes to the war between numerous search engines on web, Google undoubtedly captures a major market share of 67%. It is essentially because Google follows its mission to organize the world’s information and make it universally accessible in the most useful formats. Google browses through web pages and builds indexes for them, thus helping the user with what it is seeking. Google returns most relevant results and is convenient as it keeps the sponsored links separate from the search results. From the data shown from recent ComScore’s monthly analysis, there was a total of 19.4 billion explicit core search in July’ 2013, with Google ranking first bagging around 13 billion search out of the whole alone.Click here for more on this paper.......

Section 2 – Why did we choose Google’s Search engine business segment:

1.      Risk assessment is measurement of probability of a risk becoming a reality for a business. The main reasons behind Google being my topic of risk assessment are:

a.      Very few companies have a global presence of the level of Google’s market hold. Any other brand or company would have a localized customer base and much lesser reach as compared to Google.
b.      Google’s business extends itself beyond the boundaries of caste, color and creed. Thus, understanding, evaluating and strategizing risk for Google can give a researcher a thorough grasp on the subject of risk assessment.
c.       A risk assessment framework involves categorizing assets, identifying threats and corresponding vulnerabilities, prioritizing potential risks and determining action towards them. With Google, such a framework fits the organization’s business requirements.

Section 3 – Research Methods:
1.      For a successful research on the said topic, two main methods shall be used:

a.      Primary Research
A small survey shall be conducted on social networking websites related to use of Google search engine.
b.      Secondary Research
Inferences from other sources of information such as published journals, newspaper articles, reports from international information technology companies etc. shall be used.




Section 4 – Articles & Sources of Information:

1.      Two probable sources:Click here for more on this paper.......
a.      http://searchenginewatch.com/article/2289560/Googles-Search-Market-Share-Shoots-Back-to-67
framework-RAF












2ND– Collaborative Draft Outline-Google Proposal


Section 1 - About Google and its search engine:

Google was founded in 1998 by Larry Page and Sergey Bin while attended Standard University. Two years before, Page and Bin began to collaborate on the design of a search engine called BackRub.  BackRub was operated on Stanford University’s servers for more than a year eventually it has to be removed because it was a strain on the servers.  In 1997, Page and Bin decided to rename BackRub to Google which was inspired by the mathematical term googol which is equal to . Since its inception, Google has given the world more effective and innovative way to conduct entire searches. It is the leading search engine website, and its main business is based on advertising along to internet search results.  Being on the internet, Google search engine source code is vulnerabilities and subject to multiple attacks.
Section 2 – Google’s Search engine Risk Assessment:
Google is one the leading search engine in the world, it is web based search engine is the most popular because of its ingenuity and innovation. The presence of its search engine across the Globe has made its available for attacks. This risk assessment will assess Google search engine vulnerabilities for its users and its own infrastructures.

Section 3 – Research Methods:
The research will explore Google reaction to its vulnerabilities and security threats. The risk assessment report will include qualitative and quantitative research methods. The research will gathers public materials about Google which are ready available on the Internet. All the referenced works will be cited according to APA style format.

Section 4 – Articles & Annotated Bibliography

Thomas, L.T (2010).  Google Confronts China’s “Three Warfares”.  Retrieved from
          http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/2010summer/thomas.pdf
This article analyses the context in why Google was successfully attached by hackers originated from china and how Google’s responded. It proceeds on showing that was not able to able to protect its users or its infrastructure. The attackers succeeded in penetrating elaborate computer security systems and obtaining crucial corporate data and software source codes. The exfiltration operation relied upon previously stolen valid user accounts to breach the company’s internal servers. This article was written by Timothy L. Thomas who is an analyst at the Foreign Military Studies Office (FMSO) at Fort Leavenworth, Kansas. The author work references several works and is unbiased. The article discusses an issue that is relevant in today society, Google’s vulnerabilities, threats, security risk. These topics are relevant for my research.
Google (2013).Vulnerability Reward Program. Retrieved from
            http://www.google.com/about/appsecurity/reward-program/

This article is about the effort that Google is deploring in order to protect its infrastructure and its users. Google knows that its systems have vulnerabilities and it prefers that these are discovered by its own hackers. To encourage these external contributions, Google has established a Vulnerability Reward Program for Google-owned web properties and qualifying bugs range from $100 to $20,000. Any issue that substantially affects the confidentiality or integrity of user data is covered by the program such as cross-site scripting, cross-site request forgery, mixed-content scripts authentication and server-side code execution bugs. This article was written by Google, it shows that Google is conscious that it is under constant attack but it wants the limit the numbers of vulnerabilities which can be discovered by hackers. These topics are relevant for my research.


3ND   – Collaborative Draft Outline  -Google Proposal
Section 1 - About Google and its search engine:
Google, founded in 1988, provides internet-related services and products.  Its key business segment is the Google search engine.  The Google search engine is the most used search engine in the world, allowing people to search the web for information with ease.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted  Like many of its competitors Google uses algorithms, automated programs and a large keyword index to generate search results.  Google differentiates itself with its trademark PageRank algorithm, which determines the order of its search results. 
Section 2 – Why did we choose Google’s Search engine business segment:
Data management is a key factor to Google’s Search engine success.  In order for it to be an efficient search engine it requires access to users’ data, so it can store and analyze search trends; unauthorized access to this large amount of data is a huge risk for Google and its users.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted  The risks associated with and the mitigation tactics employed by Google is what led to the selection of Google’s search engine business segment.
Section 3 – Research Methods:
Research will be done via the internet from resources such as the Google website, information security magazines and regulatory organizations.
Section 4 – Articles & Sources of Information (w/brief description):
Site provides information on how search works, crawling & indexing, algorithms, fighting spam, and policies (i.e. Removal Policies).
An intro to Google’s data centers, its security management tactics and link to a white paper on Security.Click here for more on this paper.......
Google Risk Assessment Report – Project Proposal
Google, founded in 1998 by Larry Page and Sergey Bin, provides internet-related services and products.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted  Its name was inspired by the mathematical term googol, equal to.  The most popular of its services is the Google Search engine. 
Since its inception, Google has given the world more effective and innovative ways to conduct searches.   When it comes to the war between numerous search engines on web, Google captures a major market share of 67%.Its mission is to organize the world’s information and make it universally accessible in the most useful formats. Based on results from ComScore’srecent monthly analysis, there were a total of 19.4 billion explicit core searches in July 2013, with Google ranking first at around 13 billion searches out of the whole.  Like many of its competitors Google uses algorithms, automated programs and a large keyword index to generate search results.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted  Google differentiates itself with its trademark PageRank algorithm, which determines the order of its search results.  As an internet based service, its source code is vulnerable and subject to numerous attacks.
The scope of our project is concerning Google’s key business segment, its search engine and its vulnerabilities as it pertains to its users and its infrastructure.  Google’s global presence and popularity has deemed it a prime target for hackers.  Data management is a key factor to Google’s Search engine success;in order for Google to be an efficient search engine it requires access to users’ data, so it can store and analyze search trends; unauthorized access to this large amount of data is a huge risk for Google and its users.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted  It is our aim to categorize assets, identify threats and corresponding vulnerabilities and provide an assessment of the risks to Google’s search engine.
Our research will explore Google’s reaction to its vulnerabilities and security threats,as well as, information gathered via the internet from published journals, magazine articles, international technology companies and regulatory organizations.  It is our intention to use both quantitative and qualitative research methods to produce a well-rounded assessment of risky environment.  All the referenced works will be cited according to APA style format.






























Annotated Bibliography:

Thomas, L.T (2010).  Google Confronts China’s “Three Warfares”.  Retrieved from
This article analyses the context in why Google was successfully attached by hackers originated from china and how Google’s responded. It proceeds on showing that was not able to able to protect its users or its infrastructure.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted The attackers succeeded in penetrating elaborate computer security systems and obtaining crucial corporate data and software source codes. The exfiltration operation relied upon previously stolen valid user accounts to breach the company’s internal servers. This article was written by Timothy L. Thomas who is an analyst at the Foreign Military Studies Office (FMSO) at Fort Leavenworth, Kansas. The author work references several works and is unbiased. The article discusses an issue that is relevant in today society, Google’s vulnerabilities, threats, security risk. These topics are relevant for my research.
Google (2013). Vulnerability Reward Program. Retrieved from
This article is about the effort that Google is deploring in order to protect its infrastructure and its users. Google knows that its systems have vulnerabilities and it prefers that these are discovered by its own hackers. To encourage these external contributions, Google has established a Vulnerability Reward Program for Google-owned web properties and qualifying bugs range from $100 to $20,000. Any issue that substantially affects the confidentiality or integrity of user data is covered by the program such as cross-site scripting, cross-site request forgery, mixed-content scripts authentication and server-side code execution bugs.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted This article was written by Google, it shows that Google is conscious that it is under constant attack but it wants the limit the numbers of vulnerabilities which can be discovered by hackers. These topics are relevant for my research.

Google. Inside Search. Retrieved from 
This section of Google’s website provides information on the inner workings of its search engine.  It is a valuable resource in understanding the various processes involved in the search process.   It reviews the process of crawling to gather information, indexing to sort information, choices available to website owners to restrict access and various phases of the search process.  Additionally the role of algorithms in producing search results and processes involved in filtering out spam are explained.   Policies concerning exceptions listing to prevent unauthorized access to minors, fighting spam, phishing websites and malware, transparency for webmasters and preventing identity threats so personal information is not compromised.  Understanding how search works will be critical in assessing the potential risks faced by the search engine.

Google (2011).  Security WhitePaper:  Google Apps Messaging and Collaboration Products.         Retrieved from:  http://www.google.com/about/datacenters/inside/data-security/index.html
This security white paper by Google, addresses the various processes in place to guarantee security to the many facets of Google’s services.  Its organizational security section reviews information security, physical security, global internal audit and global compliance.Click here for more on this paper.......
Click here to have a similar A+ quality paper done for you by one of our writers within the set deadline at a discounted  The asset classification and control section provides information on access, deleted data and media disposal.  The operational security section provides information on malware prevention, security monitoring program, vulnerability management, incident management, network security and operating system security.  Additionally the access control section of the paper discusses authentication controls and authorization controls.  All of which are important factors in Google’s ability to carry out its services and protect itself and its users. 


http://searchenginewatch.com/article/2289560/Googles-Search-Market-Share-Shoots-Back-to-67

No comments:

Post a Comment