Analyzing the company's e-commerce operations

Assignment Help Other Subject
Reference no: EM132672875

CSIA 350 Cybersecurity in Business & Industry - University of Maryland Global Campus

Project - e-Commerce Risk Analysis

Description

For this project, you will begin by researching a publicly traded company that engages in e-Commerce. You will then review the company's risk statements as published each year in the company's Annual Report to Investors (also published in the company's annual filing of SEC Form 10-K). After analyzing the company's e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company's e-Commerce activities (including all supporting business processes).

A list of approved companies appears at the end of this file (see Table 2). If you wish to use a company not on the approved list you must first obtain the approval of your instructor.

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: "Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events" and Appendix H: "Impact: Effects of Threat Events on Organizations, Individuals, and the Nation."

Research Your Chosen Company
1. Review the company's website to learn about the products and services which it sells via e-Commerce.
2. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile.
3. Use the search bar at the top of the "Search & Build a List" tab to find your chosen company.

4. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the "OneStop Report" button to generate a PDF version of the information. Select "Core" under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.

5. After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.
6. Using the information obtained from your sources, identify the types of information and business operations which drive this company's need for cybersecurity products and services. (What needs to be protected?)
Analyze the Company's Risk Statements

1. Using the links from Table 1 (at the end of this file), download a copy of your selected company's most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

2. Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.

3. Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.

Write

1. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.

2. A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)

3. An overview of the company's e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.

4. A separate section in which you describe this company's needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company's e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.

5. A separate section which provides a detailed summary of the identified risks and potential impacts upon the company's operations as a whole. What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.

Attachment:- e commerce risk analysis.rar

Reference no: EM132672875

Questions Cloud

What is the most compelling justification for democracy : What is the most compelling justification for democracy? Consider the strengths and weaknesses of a variety of reasons.
How do demonstrate the labor rate variance : Direct material of 6.00 yards. Demonstrate the labor rate variance and round to the nearest whole dollar. Enter a favorable variance as a negative number.
What is the central spirit of democracy : What is the central "spirit" of democracy? What sets democracies apart from other forms of government?
How do retail sales help drive economic growth : How do retail sales help drive economic growth? Why will Starbucks close up to 400 locations over the next 18 months? The response must be typed.
Analyzing the company's e-commerce operations : Analyzing the company's e-Commerce operations - cybersecurity risk analysis which focuses upon the company's e-Commerce activities including all supporting
Federal bureaucracy in the united states : How and why do presidents seek to control the vast executive branch and the federal bureaucracy in the United States?
How do compute the total materials variance : How do Compute the total materials variance and round to the nearest whole dollar. Enter a favorable variance as a negative number.
How does the presidential election works in united states : How does the presidential election works in the United States? How is it different than others? What is the process by which a president is elected?
Identify one real-life example of personal ethics : First, identify one real-life example of personal ethics and one real-life example of corporate social responsibility in the financial field from the last.

Reviews

Write a Review

Other Subject Questions & Answers

  Analyze how this scenario affects the organization

Write a report in which you analyze what the survey findings mean for the organization and develop a plan to address the impacts. Make sure to address the following: Analyze how this scenario affects the organization. Identify why this division may..

  Describe the photograph as though the reader has never seen

Explain the photograph as though the reader has never seen it. What do you see? Describe the image and the style. Then, do the same with your modern selection.

  Simplify the molecular mechanisms of refractory

Why is the refractory period during an action potential important and describe the molecular mechanisms.

  Compare and contrast the arguments of the speeches

Compare and contrast the arguments of the speeches. Which argument is most compelling and why

  Write a response about the given post

Reply to the posts of two peers in this discussion. Share any professional or personal insights you may have that are related to your peer's research problem. Comment on how it might benefit you as a counselor if research on your peer's research p..

  Discuss the social construction of childhood

How has the U.S. racial-ethnic composition been changing over time? What are the implications of these changes for understanding the family?

  Describe each policy and explain its impact on population

Describe each policy and explain its impact on the population. Do the same for your second population. End the paper with a conclusion/summary.

  Mothers of the movement at the dnc in 2016

Mothers of the Movement at the DNC in 2016. Whom was the MOM appearance meant to appeal to? What was it supposed to signal?

  Describe the nature and all dimensions of ethical issues

Describe the nature and all dimensions of the three ethical issues

  Does a licensed health-care provider have a obligation

Does a licensed health-care provider have a special obligation to obey the law relating to her or his practice?Is the common-law position that physicians have no general duty to treat morally acceptable? In your answer, be sure to appeal to at least..

  How you could address your identified weaknesses

Include strategies for how you could address your identified weaknesses to minimize their negative impact. Analyze what you can personally gain from being.

  Describe three take-aways that you are leaving with course

Describe three take-aways that you are leaving with this course; how will your new knowledge of careers and career management impact your future career?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd