Preview

Cmgt 400 Week 2

Better Essays
Open Document
Open Document
1100 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 400 Week 2
Common Information Security Threats
University of Phoenix

The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.
Amazon.com website went online in 1995 (Byers, 2006). Amazon offers there services and products through the website Amazon.com to many countries around the world, which includes: United States, Canada, France, Spain, Japan, Italy, Germany, United Kingdom, and China (Amazon, 2012). Amazon has been around for approximately 17 years and continuous to be a successful business. One of the reason for this is because Amazon investing time in Information Security. Amazon has a massive amount of information on servers around the globe contain sensitive information, not only information for Amazon but also for Amazon’s customers. Some examples of the information Amazon maintains on the servers they own: product information, warehouse information, call center information, customer service information, service information, customer account information, bank information, cloud computing information, digital media download information, and reviews of customers for product information (Amazon, 2012).
There will always be some kind of the potential risks to the information maintained by any business or person because new vulnerabilities are found every day. Just recently, on August 7, 2012, a wired magazine reporter’s information stored on his Google account, Twitter account, MacBook, iPad, and iPhone where erased without the user wanting this done. A hacker that goes by the name of Phobia comprised the reporters Amazon account with a security exploit.
The security exploit allowed Phobia to access the



References: Amazon. (2012). Amazon. Retrieved from http://www.amazon.com Byers, A. (2006). Jeff Bezos: the founder of Amazon.com. New York, NY: The Rosen Publishing Group. Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company. Hickey, A. R. (2011, October 28). Researchers Uncover 'Massive Security Flaws ' In Amazon Cloud. Retrieved from http://www.crn.com/news/cloud/23190911/researchers-unconver-massive-security-flaws-in-amazon-cloud.htm Kerr, D. (2012, August 7). Amazon addresses security exploit after journalist hack. Retrieved from http://news.cnet.com/8301-1009_3-57488759-83/amazon-addresses-security-exploit-after-journalist-hack/ Vilches, J. (2012, January 16). Amazon owned Zappos hacked. Retrieved from http://www.techspot.com/news/47060-amazon-owned-zappos-hacked-24-million-accounts-compromised.html Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.

You May Also Find These Documents Helpful

  • Better Essays

    Amazon.com is a publicly traded worldwide online retail company founded by Jeff Bezos on July 5, 1995 in Seattle, Washington. The company originally began as an online bookstore as Bezos felt there was a high demand for literature, and books had a low price point and a huge selection of titles available in print. Technological innovation drives the growth of Amazon.com to offer customers more types of products, more conveniently and at lower prices. Since 1995, Amazon has significantly expanded its product selection, international retail websites, and worldwide network of fulfillment and customer service centers. Today, Amazon retail websites offer everything from toys and video games to MP3 downloads and collectible items (amazon.com, 2014). Amazons business model is fairly simple; to sell various products and goods online at an affordable cost to consumers. Amazon has managed to not only achieve this business model but they have also managed to consistently expand and become the largest online retailer to date. To keep up with global demand, Amazon had to expand its products and services offered while continuing to forecast consumer’s needs. “In 2000, Amazon.com began to offer its best-of-breed e-commerce platform to other retailers and to individual sellers. Today, hundreds of thousands of world-class retail brands and individual sellers increase their sales and reach new customers by leveraging the power of the Amazon.com e-commerce platform. Partners work with Amazon Services to power their e-commerce offerings from end-to-end, including technology services, merchandising, customer service, and order fulfillment. Other branded merchants leverage Amazon.com as an incremental sales channel for their new merchandise. Over 2 million third-party sellers participate in Amazon where they offer new, used, and…

    • 891 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Bus 320 Final Paper

    • 1741 Words
    • 7 Pages

    Founded in 1995 by Jeff Bezos, Amazon.com has become one of the largest known online stores in the world. In 1995, Amazon.com sold its first book online, which was shipped from Bezos’s garage in Bellevue, Washington (Amazon.com Mission Statement, 2012). Many may not know that Amazon.com had a slow start because their online layout was not appealing. Within a few years Bezos attracted a few investors who took interest in his venture and invested approximately $140,000. Bezos decided to use the money to create a more appealing website to attract more customers. The sales for the next three years surpassed Bezos’s expectations. After analyzing the sales data, he found that people were not only purchasing domestically, but also from around the world. Amazon.com has grown from a small company to a worldwide business in just a few short years. This rapid growth requires a company to reevaluate how it does business if it plans to expand or maintain its marketplace for the future.…

    • 1741 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of Information Security (3rd ed.). Boston: Course Technology-Cengage.…

    • 939 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Amazon’s 2012 financial statement is quite extensive. The statement reviews the business in general, risk factors, common stock, shareholder maters, and operational results. The business’ main goal is to be he Earth’s most customer-centric company for four primary customer sets: consumers, sellers, enterprises, and content creators. Customers are served through the organization’s retail website. The website focuses on selection, price, and convenience. Amazon also offers programs that enable sellers to sell their products on its website and their own branded websites. The company serves developers and enterprises of all sizes by providing access to technology infrastructure that enables virtually any type of business. In addition, it serves authors and independent publishers with Kindle Direct Publishing. Knowing the…

    • 2357 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    IT security

    • 43660 Words
    • 366 Pages

    Ethical H acking a n d C o u n te rm e a s u re s…

    • 43660 Words
    • 366 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Program

    • 1803 Words
    • 8 Pages

    "Information Security Program." Office of the CISO. University of Washington, 2013. Web. 20 Apr. 2013.…

    • 1803 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hacking

    • 4083 Words
    • 17 Pages

    11. McClure, Stuart. Et al. (2003), Hacking exposed: Network security secrets & solutions, Fourth edition, Berkley, California (USA), McGraw-Hill/Osborne.…

    • 4083 Words
    • 17 Pages
    Powerful Essays