Preview

Discussion Paper Chapter 3

Satisfactory Essays
Open Document
Open Document
280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Discussion Paper Chapter 3
Discussion Questions: Chapter #7

1) Security isn’t simply a technology issue, it’s a business issue. Discuss. Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.
2) If you were developing a business continuity plan for your company, where would you start? What aspects of the business would the plan address? If I were developing a business continuity plan for my company I would start forming back up teams in different locations that work together to create and coordinate plans addressing loss of facilities, personnel, critical systems so that the company can continue to operate when a catastrophic event occurs.

3) Suppose your business had an e-commerce Web site where it sold goods and accepted credit card payments. Discuss the major security threats to this Web site and their potential impact. What can be done to minimize these threats? The major treat for e-commerce is identity theft in which an imposter obtains personal information such as social security , driver license, credit card number to impersonate someone else. Having security control in your website like firewalls, intrusion detection systems, securing wireless network and antivirus software can help us to avoid or reduce this kind of treat.

You May Also Find These Documents Helpful

  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Server Backup. You also configured the organization’s Web servers to host content from a single…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 6

    • 817 Words
    • 4 Pages

    3. Typically, a business continuity plan is also a compilation or collection of other plans. What other plans might a BCP and all supporting documents include? Technical backup Plan: How can you recover smoothly from technical glitches. Communications Plan: What communication will facilitate this recovery.…

    • 817 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Supply Disruption  Customer Disruption  Employee Disruption Communication Utilities Contingency Planning Process High Level Contingency and Disaster Recovery Planning Strategy • Develop the Business Contingency Planning • • • • • • • Policy and Business Process Priorities Conduct a Risk Assessment Conduct the Business Impact Analysis (BIA) Develop Business Continuity and Recovery Strategies Develop Business Continuity Plans Conduct awareness, testing, and training of the DRP Conduct Disaster Recovery Plan maintenance and exercise Identify business processes Industry Standards ISO 27001 : Requirements for Information Security Management Systems. Section 14 addresses business continuity management.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Is3110 Week4 Lab1

    • 569 Words
    • 2 Pages

    2 Why is a business impact analysis (BIA) an important first step in defining a business continuity plan (BCP)?…

    • 569 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    continuity plan overview

    • 689 Words
    • 3 Pages

    In this writing I will be presenting the main duties for the Business Continuity Lead/Manager position. I feel this position is one that is of great importance, particularly in dealing with the sensitive healthcare information and systems that you all use on a daily basis. This position gives you at least some insurance that if something were to happen your company would not be lost or have a great deal of downtime from providing your essential services to your clients. I will begin by describing some of the task that are requirements of this position.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Acronis Continuity Plan

    • 683 Words
    • 3 Pages

    Take account of changing business needs and ensure that the response plans and business continuity strategy are revised where necessary;…

    • 683 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I am currently working on Business Continuity (BC) activities as it relates to the Minnetonka office. BC plan is a clear and comprehensive statement of actions to take before, throughout and after a disaster to minimize its impact. It also offers a certain level of comfort in knowing when a catastrophe does arise, it won't result in complete disaster for its people and facility.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In the last decade, more and more companies have started to look into e-commerce to connect them to the infinite world of global suppliers, partners, consumers and much more. This boom in technology has placed multiple assets are risk from a security stand point allowing hackers/crakers and anyone on the internet to gain access to these network and gain information or try to jeopardize business to a point where it stand stills.…

    • 1237 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Writing a Business Plan

    • 634 Words
    • 3 Pages

    When a business plan is written for a company, there are multiple audiences who will be reviewing it as well as utilizing it for the implementation factor. A business plan is the basis for answering questions to implement ideas and objectives for a successful business. Once a business plan is written, a successful company will use it as a road map, and make adjustments to it as needed. However, a business plan, for it to be effective, must be communicated to those groups who need to know what the desired goals and outcomes are. These groups include owners, employees, boards of directors, shareholders and communities. They are discussed as follows.…

    • 634 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Small Business Report

    • 1122 Words
    • 5 Pages

    Effective business planning has to begin with an honest and realistic appraisal of the current position of the business. The formal term for this is “situational analysis” and there are several planning tools and methods which are helpful in putting the analysis together. The true purpose of situational analysis is to determine which opportunities to pursue. Having determined the current position, the next step is to determine the direction of the business. Ask yourself a series of questions, starting wit, “Where are we going”? The outputs from asking this question are the vision of the non-specific directional and motivational guidance for the entire business. “What will the…

    • 1122 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The first objective of the study is to identify the ethical problems and issues related to e-commerce. The Internet poses fundamental challenges to issues central to society. With the advent of E-Commerce, it brings with it a host of ethical issues surrounding customer privacy. In protecting individual and corporate privacy, it has become a major ethical issue where it has created an entire segment of Internet industry firms whose mission is to help consumers protect sensitive and personal data on the web. The second objective would be to discover the essential requirements in E-Commerce. Where what are the major factors and components needed to have a successful E-Commerce business. This will help to enhance the business towards and advanced status. Followed by the third objective which would be to identify what are the threats in E-Commerce. This will enable people to avoid the threats and spam which has been sent to them by hackers in order to get their personal information for unethical use. Besides that, they can also avoid getting virus attack where it can cause major destruction. The final objective of this study would be, to provide a better understanding on how businesses and consumers can be safe from online threats. This is because the internet has become a tool for online business and hackers can not only attack the business but also the customers. This can disrupt the whole business procedure. False emails will be sent as spam to get private information such as ATM pin number, credit card number and so on. The business should also be aware of insider threats such as data…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ebusiness

    • 358 Words
    • 2 Pages

    Module1 Introduction E-Business - Origin and Need of E-Commerce, Factors affecting E-Commerce, Business dimension and technological dimension of E-Commerce, E-Commerce frame work Electronic Commerce Models, Types of Electronic Commerce, Value Chains in Electronic Commerce. Module 2 Internet and E-Business Introduction to internet and its application, Intranet and Extranets. World Wide Web, Internet Architectures, Internet Applications, Business Applications on Internet, E- Shopping, Electronic Data Interchange, Components of Electronic Data Interchange, Creating Web Pages using HTML. Module 3 Electronic Payment System Concept of Money, Electronic Payment System, Types of Electronic Payment Systems, Smart Cards and Electronic Payment Systems, Infrastructure Issues in EPS, Electronic Fund Transfer. Module 4 Security Issues in E-business Security Overview, Electronic Commerce Threats, Encryption, Cryptography, Public Key and Private Key Cryptography, Digital Signatures, Digital Certificates, Security Protocols over Public Networks-HTTP, SSL, Firewall as Security Control, Public Key Infrastructure (PKI) for Security, Prominent Cryptographic Applications. Module 5 E-Business Applications & Strategies Business Models & Revenue, Models over Internet, Emerging Trends in e-Business, e-Governance, Digital Commerce, Mobile Commerce, Strategies for Business over Web, Internet based Business Models. Module 6 E-Commerce and retailing On-line retail industry dynamics, On-line mercantile models from customer perspective, Management challenges in on-line retailing. E-Commerce and on-line publishing, Module 7 Emerging trends and technologies in E-Business E-Business and MIS, E-Business and ERP, E-Business and CRM, E-Business and Supply chain management, Benefits of E-Commerce; Drawbacks and limitations of E-Commerce. Minimum 5 cases to be discussed Suggested Readings 1. 2. 3. 4. 5. E-Commerce Strategy, Technologies and Applications, Whitley, David, Tata McGraw Hill. Electronic…

    • 358 Words
    • 2 Pages
    Satisfactory Essays

Related Topics