Project e-commerce risk analysis

Assignment Help Other Subject
Reference no: EM132637561

Project E-Commerce Risk Analysis

Description
For this project, you will begin by researching a publicly traded company that engages in e-Commerce. You will then review the company's risk statements as published each year in the company's Annual Report to Investors (also published in the company's annual filing of SEC Form 10-K). After analyzing the company's e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company's e-Commerce activities (including all supporting business processes).

A list of approved companies appears at the end of this file (see Table 2). If you wish to use acompany not on the approved list you must first obtain the approval of your instructor.

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: "Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events" and Appendix H: "Impact: Effects of Threat Events on Organizations, Individuals, and the Nation."

Research Your Chosen Company

1. Review the company's website to learn about the products and services which it sells via e-Commerce.

2. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile.

3. Use the search bar at the top of the "Search & Build a List" tab to find your chosen company.

4. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the "OneStop Report" button to generate a PDF version of the information. Select "Core" under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.

5. After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.

6. Using the information obtained from your sources, identify the types of information and business operations which drive this company's need for cybersecurity products and services. (What needs to be protected?)

Analyze the Company's Risk Statements

1. Using the links from Table 1 (at the end of this file), download a copy of your selected company's most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

2. Read and analyze the Risk Factors section in the company's report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.

3. Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.

Write

1. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.

2. A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)

3. An overview of the company's e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.

4. A separate section in which you describe this company's needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company's e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.

5. A separate section which provides a detailed summary of the identified risks and potential impacts upon the company's operations as a whole.What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.

Reference no: EM132637561

Questions Cloud

Explain hadoop distributed file system : What does "distributed" mean in the phrase "Hadoop Distributed File System", and what are its advantage?
How important is green in the overall purchasing decision : How important is "green" in the overall purchasing decision for health care products and supplies? Defend your answer. The response must be typed.
System analysis and design : Identify possible actors and use cases involved in school bus operations.
Explain major considerations about the attribute type : What are the major considerations about the attribute type that we need to understand before mining the data set?
Project e-commerce risk analysis : Project E-Commerce Risk Analysis - Cybersecurity risk analysis which focuses upon the company's e-Commerce activities - products and services which it sells
Explain pseudo code of the algorithm : Sorting in this question I will examine the final order. Post-order Sorts the elements in the array A containing n integers as follows:
How does nancy justify the actions : How does Nancy justify her actions? Are the justifications reasonable? Document your response in the space below. Your response should be.
Draw the tree that results from inserting the keys : Draw the 2-3 tree that results from inserting the keys XMONYIBSADT in that order.? What will be the height of the tree drawn in question.?
Explain the purpose of amdahl law and little law : Suggest steps that can be used to increase the performance of a computer system in term of speed and throughput?

Reviews

Write a Review

Other Subject Questions & Answers

  What is the effect of counseling for adolescents

If you were granted permission to do this study at your school or agency, what steps would you take to locate participants? What legal or ethical issues would you consider as you selected participants?

  How does the mark of a criminal record address these issue

What are the barriers that ex-convicts and felons face when trying to improve their lives? How does "The Mark of a Criminal Record" address these issues?

  Analyze your internship activities in brief

Section 3- Skill Development: In the third section of the paper (minimum 2 pages) reflect specifically on your own experience in your internship.

  What factors determine demand for toothbrushes

Brinda Patel, the India country manager for the US-based consumer products company Cottle-Taylor, has proposed a 2010 marketing plan and income statement. What factors determine demand for toothbrushes? How can this demand be increased

  How can you take race into consideration in admitting

Imagine you are on a college admissions committee. How can you take race into consideration in admitting students without using a quota system?

  Means of demonstrating measurement reliability

Identify the three means of demonstrating measurement reliability? Which of the three is most useful when conducting criminal justice related research? Why?

  Describe four cardiovascular conditions t

What nursing interventions are appropriate for Mrs. J. at the time of her admission?Describe Four Cardiovascular Conditions that may lead to heart failure.

  Define how can improve the health literacy of patients

Using the Internet, the Walden Library, or other trustworthy sources, identify a resource that you could introduce to patients to help them evaluate.

  Describe the protestant reformation and its lasting impact

Describe the Protestant Reformation and its lasting impact on Christianity as we know it today. Answer the question in a 2-page Microsoft document.

  Prepare a case identification process for theresa

Prepare a case identification process for Theresa regarding her visit to the hospital. What would you do as a potential health care administrator to improve.

  Why is an agrarian based society often bad for a country

Why is an agrarian based society often bad for a country. What are the future problems that must be addressed related to agriculture in Central America

  Subjective and objective data

1. List the subjective data noted in the following case history that follows:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd