Week 2. Discussion Constant Dangers – Ethical, Legal, Privacy and Web Issues CMGT/400 Write a 100- to 200- word short-answer response for the following: Supporting Activity: Threats from Social Networking Based on the readings and your personal experience, are social network threats taken too lightly by organizations? 2. Write a 100- to 200- word short-answer response for the following: Supporting Activity: Vulnerabilities to Businesses Which of the threats from social networking from the reading also apply to other businesses? Which do not? Why do you think so? 3. Write a 100- to 200- word short-answer response for the following: Supporting Activity: Information Assurance and Security How does an organization identify its vulnerabilities relative to information assurance and security? How do they identify the legalities and ethics involved? What should it do after it has identified them? 4. Write a 100- to 200- word short-answer response for the following: Supporting Activity: Privacy and Legalities Do you think that the need of an organization ever overrides the need for privacy of an individual? Discuss the legalities involved, along with the ethical issues. 5 Write 100- to 200-word short-answer response to the following: Supporting Activity: Global Issues In this global economy, how should a company handle the differences in security when dealing with off-shore development and multi-national organizations? Types of Attacks and Malicious Software 6 Write 100- to 200-word short-answer response to the following: How can you protect against worms of the type that Robert Morris unleashed on the Internet? 7 Write 100- to 200-word short-answer response to the following: A war-driving attack is an attempt to exploit what technology? 8. Write 100- to 200-word short-answer response to the following : Which attack takes advantage of a trusted relationship that exists between two systems? APA format requires a concluding paragraph which sums up the wholepaper . Format your paper consistent with APA guidelines. .