Analyze the companys risk statements

Assignment Help Other Subject
Reference no: EM132610767

Project - E-Commerce Risk Analysis

Description

For this project, you will begin by researching a publicly traded company that engages in e-Commerce. You will then review the company's risk statements as published each year in the company's Annual Report to Investors (also published in the company's annual filing of SEC Form 10-K). After analyzing the company's e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company's e-Commerce activities (including all supporting business processes).

A list of approved companies appears at the end of this file (see Table 2). If you wish to use acompany not on the approved list you must first obtain the approval of your instructor.

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: "Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events" and Appendix H: "Impact: Effects of Threat Events on Organizations, Individuals, and the Nation."

Research Your Chosen Company

1. Review the company's website to learn about the products and services which it sells via e-Commerce.

2. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile.

3. Use the search bar at the top of the "Search & Build a List" tab to find your chosen company.

4. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the "OneStop Report" button to generate a PDF version of the information. Select "Core" under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.

5. After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.

6. Using the information obtained from your sources, identify the types of information and business operations which drive this company's need for cybersecurity products and services. (What needs to be protected?)

Analyze the Company's Risk Statements

1. Using the links from Table 1 (at the end of this file), download a copy of your selected company's most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

2. Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.

3. Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.

Write

1. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.

2. A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)

3. An overviewof the company's e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.

4. A separate section in which you describe this company's needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company's e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.

5. A separate section which provides a detailed summary of the identified risks and potential impacts upon the company's operations as a whole.What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.

Reference no: EM132610767

Questions Cloud

What is kelly deductible theft loss in the current year : What is Kelly's deductible theft loss in the current year if the theft is not discovered until January of the year? What is Kelly's deductible theft loss
What is the rate of heat flow through the door : By what factor is the heat flow increased if a window 0.50 m on a side is inserted in the door? The glass is 0.450 cm thick
Compute the ratio of the rate of heat loss : Compute the ratio of the rate of heat loss through a single pane window with area 0.15 m22 to that for a double
Why should not the income statement be directly used : Based on knowledge of the income statement, why shouldn't the income statement be directly used to monitor a company's cash flows from operating activities?
Analyze the companys risk statements : Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information
Prepare the journal entry at december to record asset : Prepare the journal entry to record depreciation expense for 2021. Prepare the journal entry, if any, to record the increase in fair value.
Velocity of the object changing durning the entire flight : Is the velocity of the object changing durning the entire flight or just at certain times? Explain.
Approximate volume of blood in the human body : The total length of the blood vessels in the body is roughly 900,000 km. Most of this length is due to the capillaries
List criticisms that can made of historical cost accounting : List some of the criticisms that can be made of historical cost accounting when it is applied in times of rising prices. Explain in detail.

Reviews

Write a Review

Other Subject Questions & Answers

  Determining which argument is correct

The Snapchat app provides a way for social media users to share content with their friends that disappears after a brief time.

  Describe how your activities would be differentiated

For this benchmark, you will complete a mini-unit of three informational text-based lesson plans and a corresponding assessment plan.

  Distances in order from smallest to largest

Arrange the following distances in order from smallest to largest.

  Defense of the theory presented

Finally, either respond to that objection, in defense of the theory presented, or present an alternative theory, which does not fall to that objection.

  How can children art development inform you

How can children's art development inform you? What clues can it provide about their cognitive, psychological and mental development?

  Define incorporate policy advocacy

Explain the steps a social workers might take to incorporate policy advocacy on their practice based insight, experiences

  What is the nature of the world around us

Write an 800-1,000-word essay on your personal worldview. Briefly discuss the various possible meanings of the term "spirituality," and your understanding of the concepts of pluralism, scientism, and postmodernism. What is the nature of the world ..

  Characteristics predetermined by genetics

Are our gender related characteristics predetermined by genetics or influenced by our environment?  What examples have you seen that prove or disprove this theory?

  Describe the types of protocols that should be required

Describe the types of protocols that should be required for each feature discussed. Describe how this plant should be validated.

  Discuss the effect and needs of insurance

Choose a type of healthcare delivery system to study from the list below. Prepare a 2-3 page paper which includes information about a specific hospital.

  Evaluate the company activities in brief

Using business journals, find an example of a company that is trying to emulate the factors that make small businesses flexible and more responsive.

  Develop a risk mitigation plan

Develop a risk mitigation plan to address the previously identified risks associated with the introduction of the new product

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd