Write a policy about acceptable use policy

Assignment Help Computer Network Security
Reference no: EM132507859

Case Study: Online Grocery Business: The Case of ASDA.com

Write a policy about Acceptable use policy

Stakeholders and Connections
• The ASDA.com is a subsidiary of Wall-Mart and uses their "Retail Link" system for managing goods inventory, suppliers, ordering and customer purchase history records
• Customers and potential customers
• Suppliers of goods
• Software development company (let's assume that software development is outsourced to one provider)
• IT Services providers:
oData centre, web-hosting and central systems management provider oIn-store technical support provider
• External software and systems security consultants and penetration testers
• Bank for credit card verification
• Authorities in the sense that the company must follow laws and regulations
• Others: competitors, insurer

Business Processes
There are many business processes involved. Here is a list of some identified processes:
• Web-orders processing, including:
o Manage shopping cart and checking availability oCheckout: Payment and Invoicing oPicking of goods and packaging oDelivery of goods
• CRM:
o Customer support
o Online and phone support for inquiries and complaints oCustomer details management
–Create accounts oMarketing
• Supply chain management / "Warehouse" management oOrders are picked in the local stores
o Local store stocks and goods ordering is management by Wall-mart's "Retail Link" oSales forecasting oStaff roster management
• Reporting:
o Financial reporting, tax reporting etc.
Risks and Threats

Examples of Risks:
• Web-site defacement
• Change of critical information like the pricing of good
• Web-site unavailability due to oan DoS attack oan uncontained intrusion ophysical security problem ohardware or software problem ooverloading (out of resources)
• Customer information leaks (insider and external)
• System information leaks (insider and external)
• Company information leaks (pricing, salaries etc.)
Possible vulnerabilities:
• Poorly written and tested production software with security holes
• Unwanted malware
• Insider access to critical resources
• Weak authentication and authorization mechanisms
• Weaknesses at business partner's or vendors systems and attacks through their systems
• Unsecured physical resources
• Single points of failure (HW or human)
Possible exploitations:
• SQL Injection
• Cross-site scripting
• Remote code execution
• Malicious (proprietary) software manipulation
• Rogue wireless access points
• Wire-tapping (SW or HW)
Many more exists, but this list should get you started.

Attachment:- Online Grocery Business.rar

Reference no: EM132507859

Questions Cloud

What is the sales budget for the first quarter : Compute the TVC ? Compute the Product Cost? The brothers sell pretzels for $150 per bac, marketing prepares the following sales forcast
Value chain analysis for coca cola company : What does Coke do that adds value to the Coca-Cola Company. Analyze this case and conduct a Value Chain Analysis (VCA) for Coca Cola Company.
What is the balance in the lease payable for duckduck at dec : What is the balance in the lease payable for DuckDuck at Dec. 31, 2019? What is the balance in ROU asset for DuckDuck at Dec. 31, 2019?
Compute the period cost and the total cost : Compute the period cost? Compute the total cost, Compute the prime cost, Compute the indirect material,selected sales and cost data for a special job
Write a policy about acceptable use policy : Case Study - Online Grocery Business: The Case of ASDA - Online and phone support for inquiries and complaints oCustomer details management
Servant leadership can improve communities and society : Explain how servant leadership can improve communities and society. Why is leadership courage important to realize these changes?
Do external stakeholders use financial statement analysis : Do External stakeholders use financial statement analysis in analyzing a company's financial statements for decision-making purposes. Explain if so
What is the difference between formal and informal supports : What is the difference between formal and informal supports for families or caregivers of individuals with disabilities regarding the areas of academic
Chevron texaco communities of practice : How are the CoPs in ChevronTexaco different to an organizational network? How is it developing tacit and explicit knowledge sharing?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Conduct an internet search of cyber crimes

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months.

  Explain the security breach

Explain the security breach and the steps taken to mitigate the breach, and explain whether the steps taken were adequate - what are the steps a hospital

  Describe copyright-public domain and fair use

Briefly describe copyright, public domain, and fair use. Provide a unique example of fair use. Provide an example of when copyright would be violated. Be sure not to duplicate an example that is already posted by one of your classmates times roman..

  Network security protocols

Explain several network security protocols and their similarities and differences. Evaluate a variety of network security and management tools.

  Common information security threats

This is part one of a three-part assignment. The final version will be submitted. It is expected that adjustments will be made in the final version based on the feedback provided .

  Define the physical and network security issues

Draft a description of the physical and network security issues and concerns at each Riordan plant. Draft a description on the data security issues and concerns present at each Riordan plant.

  Assessing and securing systems on a wide area network

Assessing and securing systems on a wide area network (WAN). Ten pages however , no more than fifteen pages , 12 point front , Times New Roman and doubled spaced. Your name should appear in the header along with page number.

  Social engineering attacks and counterintelligence

Social Engineering Attacks and Counterintelligence

  ICTSUS601 Integrate sustainability in ICT planning

ICTSUS601 Integrate sustainability in ICT planning and design projects Assignment Help and Solution, Australian Harbour International College - Assessment Help

  Compute runtime of an average exhaustive key-search on des

Compute the runtime of an average exhaustive key-search on DES assuming the implementational details. How many COPACOBANA machines do we need in the case of an average search time of one hour?

  Explain some virtues and shortcomings of australian computer

Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

  Discuss primary challenges related to maintaining security

Discuss the primary challenges related to maintaining the security of both applications and data in such an environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd