what is a spam
unsolicited and unwanted messages
What is stage 1
look for potential threats and weaknesses
copyright
copying original work
it is responsible for
systems relatable to social media
business risks
threats
what is stage 2
access and evaluate
malware
harmful and dangerous software
what dose dmca stand for
digital millennium copyright act
what is phishing
the fraudulent pratice of sending emails
manual sharing
gives users access to certain records
what is stage 3
monitoring and revising control efforts
licensing
establishes an agreement between you and the owner
location on the internet where people might make defamation statements
social media chat rooms
what is escalation points
the components of an escalation
shortened URLS is
posing a risk to users
what is stage 4
manages and implements mitigation efforts
fair use
prohibits original work for being used without owners permission
hijacking refers to
a social media profile being taken by a criminal
what is like or comment jacking
malicious technique of tricking users into veiwing a website
what year was the DMCA established
1998
what is stage 5
all have something to do with media
trademark
a word, phrase, sound, or image a company uses to distinguish one of its products.
what is a key component to crisis management
key personnel
what year did ftc revise its testimonial makes endorsement
2009