Project - e-Commerce Risk Analysis

Assignment Help Other Subject
Reference no: EM132583224 , Length: 1800 Words

CSIA 350 Cybersecurity in Business and Industry Assignment - University of Maryland Global Campus, USA

Project - e-Commerce Risk Analysis

Description - For this project, you will begin by researching a publicly traded company that engages in e-Commerce. You will then review the company's risk statements as published each year in the company's Annual Report to Investors (also published in the company's annual filing of SEC Form 10-K). After analyzing the company's e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company's e-Commerce activities (including all supporting business processes).

A list of approved companies appears at the end of this file (see Table 2). If you wish to use a company not on the approved list you must first obtain the approval of your instructor.

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: "Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events" and Appendix H: "Impact: Effects of Threat Events on Organizations, Individuals, and the Nation."

Research Your Chosen Company -

1. Review the company's website to learn about the products and services which it sells via e-Commerce.

2. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile.

3. Use the search bar at the top of the "Search & Build a List" tab to find your chosen company.

4. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the "OneStop Report" button to generate a PDF version of the information. Select "Core" under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.

5. After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.

6. Using the information obtained from your sources, identify the types of information and business operations which drive this company's need for cybersecurity products and services. (What needs to be protected?)

Analyze the Company's Risk Statements

1. Using the links from Table 1 (at the end of this file), download a copy of your selected company's most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

2. Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.

3. Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.

Write

1. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.

2. A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)

3. An overview of the company's e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.

4. A separate section in which you describe this company's needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company's e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.

5. A separate section which provides a detailed summary of the identified risks and potential impacts upon the company's operations as a whole. What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.

Attachment:- Cybersecurity in Business and Industry Assignment File.rar

Reference no: EM132583224

Questions Cloud

Cost of quality : Select two fast food restaurants and evaluate them in terms of service quality. Suggest ways to improve the service quality.
Average induced emf in the loop : If the loop is rotated through an angle of 90° in 0.1 second what would be the average induced EMF in the loop?
Identify health care organizations : Identify one or two health care organizations that have a negative brand image. What event or series of events led the organizations to this situation?
Calculate the sales required to achieve the objective : Maykin's management wants to earn a net profit before tax equal to 11% of sales. Calculate the sales required to achieve this objective.
Project - e-Commerce Risk Analysis : Project - e-Commerce Risk Analysis. For this project, you will begin by researching a publicly traded company that engages in e-Commerce
Essay -identify some of the risk of experimenting with drugs : Essay - Identify some of the risk of experimenting with drugs.
Calculate all the material variances : Calculate all the material variances.Quantity of groundnut oil required: 3kg. Price of groundnut oil: $2.5/kg.Production during the month: 1,000 kg
Find break-even in units and rupees : Suppose the fixed costs of operating the store are Rs. 100,000 per year. Find Break-even in units and rupees?A store sells t-shirts. The average selling price
What would happen if there was recall of contaminated milk : What would happen if there was a recall of contaminated milk? what would the retailers do and what decisions need to be made?

Reviews

Write a Review

Other Subject Questions & Answers

  Which is most prevalent in the united states and why

Using the FBI's general classification system of domestic terrorists (right wing; left wing and single issue; or international), which is most prevalent in the United States and why

  Procedure of having a justice of the peace review facts

The procedure of having a justice of the peace review facts to decide if a criminal trial should be held is called?

  Conflict theory-symbolic interactionism

Provide an example of a conflict theory perspective on crime. Provide an example of Symbolic Interactionism as a theoretical perspective on education.

  Which populations are affected by the public health issue

Which populations are affected by the public health issue you have selected? Describe the demographics of this population in detail. How old are they?

  What are the vulnerabilities and risks if they were

What role did the various layers of aviation security play in preventing the attempted attacks after 9/11? Explain.Were the effective layers tactical, policy driven, or a combination of both? Explain.How was 9/11 different from an aviation security s..

  Discuss three behaviors from your list

Discuss three behaviors from your list that you were able to categorize easily (include the behaviors and their category).

  Plato describes in general terms how poetry

Near the end of the Republic, Plato describes in general terms how poetry (media) affect the soul: "it feeds and waters" the irrational passions that we are supposed to control (sad stories make us sad, sex scenes make us horny). Do you agree with Pl..

  What is the limitation of post and lintel construction

What is the limitation of Post and Lintel construction? What was the meaning of figurative scale (size) differences in ancient Egyptian art?

  What is your greatest fear

What do you look forward to, as you begin this educational experience and your personal search for purpose?

  How chromosomes determine sex

Human body consists of 23 pairs of chromosome, the first 22 pairs of them are autosomes, and these are non sex chromosomes and 1 pair of sex chromosomes. How chromosomes determine sex.

  How efforts should be meshed and managed

Organisational structure is a formal system that separates and intergrates work related tasks and separation of tasks makes clear who should do what and intergration of tasks indicates how efforts should be meshed and managed.

  What did the elected official do that impacted the agency

What did the elected official do that impacted the agency? In your opinion, was it within his/her rights to do so? Is there any evidence that the actions were constitutionally acceptable? How do we know?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd