Analyzing the companys e-commerce operations

Assignment Help Computer Networking
Reference no: EM132583419

CSIA 350 Cybersecurity in Business and Industry - University of Maryland Global Campus

Project - e-Commerce Risk Analysis

Description

For this project, you will begin by researching a publicly traded company that engages in e-Commerce. You will then review the company's risk statements as published each year in the company's Annual Report to Investors (also published in the company's annual filing of SEC Form 10-K). After analyzing the company's e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company's e-Commerce activities (including all supporting business processes).

A list of approved companies appears at the end of this file (see Table 2). If you wish to use acompany not on the approved list you must first obtain the approval of your instructor.

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: "Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events" and Appendix H: "Impact: Effects of Threat Events on Organizations, Individuals, and the Nation."

Research Your Chosen Company

1. Review the company's website to learn about the products and services which it sells via e-Commerce.

2. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile.

3. Use the search bar at the top of the "Search & Build a List" tab to find your chosen company.

4. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the "OneStop Report" button to generate a PDF version of the information. Select "Core" under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.

5. After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.

6. Using the information obtained from your sources, identify the types of information and business operations which drive this company's need for cybersecurity products and services. (What needs to be protected?)

Analyze the Company's Risk Statements

1. Using the links from Table 1 (at the end of this file), download a copy of your selected company's most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

2. Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.

3. Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.

Write

Question 1. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.

Question 2. A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)

Question 3. An overview of the company's e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.

Question 4. A separate section in which you describe this company's needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company's e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.

Question 5. A separate section which provides a detailed summary of the identified risks and potential impacts upon the company's operations as a whole.What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.

Attachment:- E-Commerce Risk Analysis.rar

Reference no: EM132583419

Questions Cloud

What are the economic costs of waiting lines : What are the economic costs of waiting lines? How might these costs be measured? What decision criteria can be used to justify expanding services to reduce
How to compute the average cost per kilometre of owning : One truck that has been driven 50,000 kilometres during the first year. Compute the average cost per kilometre of owning and operating the truck.
Prepare budget plan for the implementation : Health care is a public policy that differs depending on where you live; Prepare a budget plan for the implementation of your chosen healthcare program.
What is impact of capitalist and socialist economic systems : Business Question - What is the impact of capitalist and socialist economic systems on the way small businesses are operate
Analyzing the companys e-commerce operations : Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis
Find and calculate the market risk premium : Find and calculate the market risk premium and the expected rate of return on the market. (Enter your answers as a whole percent.)
Find out current ratio : Find out current ratio. Gross Debtors Rs. 20,000; Provision for Bad debts Rs. 3,000; Bills receivable Rs. 13,000; Stock twice of net debtors
Newton law of universal gravitation : Determine the mass of the planet using Newton's Law of Universal Gravitation.
Write Research Paper on Post-Traumatic Stress Disorder : Write Research Paper on Post-Traumatic Stress Disorder. Why the name of the disorder / concept or definition

Reviews

Write a Review

Computer Networking Questions & Answers

  Famous financial corporationas head of the information

famous financial corporationas head of the information protection department of famous corporation you have just

  What is the minimum packet size

In the IEEE 802.3 frame format, what is the PAD field used for? What is the minimum packet size?

  Build a document giving all the necessary network designs

BN321 Advanced Network Design Assignment - Local Area Network Design and Implementation, Melbourne Institute of Technology, Australia

  Decision tree

One major issue for any decision tree algorithm is how to choose an attribute based on which the data set can be categorized and a well-balanced tree can be created. The most traditional approach is called the ID3 algorithm proposed by Quinlan in 198..

  Computing smallest window size to optimize the throughput

Consider error-free 256 kbps satellite channel used to send 1024-byte data frames. What is smallest window size that is large enough to optimize the throughput?

  Design business network for a primary school

Melbourne institute of technology MN503 - Overview of Internetworking - Primary School Network Design with Guest Network

  Examine risks and vulnerability associated with public cloud

Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies.

  Data model development and implementation

Data model development and implementation - Understand the fundamental principles of the networking and data requirements of a network

  Would a packet-switched network or a circuit-switched

consider an application that transmits data at a steady rate for example the sender generates an n-bit unit of data

  Developing channels of communication and collaboration

Developing Channels of Communication and Collaboration

  Compare the bus topology and the star topology

Describe the five IP addressing classes. Provide an example for each of classes in binary and dotted-decimal representation. Show the conversion of each of the addresses. Describe the function of the subnet address for each of the classes and how ..

  Primary functional components of a software application

Explain the difference among client-server architecture, server-based architecture, and client-based architecture; and distinguish between the two-tier, three-tier, and n-tier client-server architectures.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd