Preview

Cmgt 400 Week 2

Better Essays
Open Document
Open Document
1100 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 400 Week 2
Common Information Security Threats
University of Phoenix

The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.
Amazon.com website went online in 1995 (Byers, 2006). Amazon offers there services and products through the website Amazon.com to many countries around the world, which includes: United States, Canada, France, Spain, Japan, Italy, Germany, United Kingdom, and China (Amazon, 2012). Amazon has been around for approximately 17 years and continuous to be a successful business. One of the reason for this is because Amazon investing time in Information Security. Amazon has a massive amount of information on servers around the globe contain sensitive information, not only information for Amazon but also for Amazon’s customers. Some examples of the information Amazon maintains on the servers they own: product information, warehouse information, call center information, customer service information, service information, customer account information, bank information, cloud computing information, digital media download information, and reviews of customers for product information (Amazon, 2012).
There will always be some kind of the potential risks to the information maintained by any business or person because new vulnerabilities are found every day. Just recently, on August 7, 2012, a wired magazine reporter’s information stored on his Google account, Twitter account, MacBook, iPad, and iPhone where erased without the user wanting this done. A hacker that goes by the name of Phobia comprised the reporters Amazon account with a security exploit.
The security exploit allowed Phobia to access the



References: Amazon. (2012). Amazon. Retrieved from http://www.amazon.com Byers, A. (2006). Jeff Bezos: the founder of Amazon.com. New York, NY: The Rosen Publishing Group. Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company. Hickey, A. R. (2011, October 28). Researchers Uncover 'Massive Security Flaws ' In Amazon Cloud. Retrieved from http://www.crn.com/news/cloud/23190911/researchers-unconver-massive-security-flaws-in-amazon-cloud.htm Kerr, D. (2012, August 7). Amazon addresses security exploit after journalist hack. Retrieved from http://news.cnet.com/8301-1009_3-57488759-83/amazon-addresses-security-exploit-after-journalist-hack/ Vilches, J. (2012, January 16). Amazon owned Zappos hacked. Retrieved from http://www.techspot.com/news/47060-amazon-owned-zappos-hacked-24-million-accounts-compromised.html Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.

You May Also Find These Documents Helpful

  • Better Essays

    Amazon.com is a publicly traded worldwide online retail company founded by Jeff Bezos on July 5, 1995 in Seattle, Washington. The company originally began as an online bookstore as Bezos felt there was a high demand for literature, and books had a low price point and a huge selection of titles available in print. Technological innovation drives the growth of Amazon.com to offer customers more types of products, more conveniently and at lower prices. Since 1995, Amazon has significantly expanded its product selection, international retail websites, and worldwide network of fulfillment and customer service centers. Today, Amazon retail websites offer everything from toys and video games to MP3 downloads and collectible items (amazon.com, 2014). Amazons business model is fairly simple; to sell various products and goods online at an affordable cost to consumers. Amazon has managed to not only achieve this business model but they have also managed to consistently expand and become the largest online retailer to date. To keep up with global demand, Amazon had to expand its products and services offered while continuing to forecast consumer’s needs. “In 2000, Amazon.com began to offer its best-of-breed e-commerce platform to other retailers and to individual sellers. Today, hundreds of thousands of world-class retail brands and individual sellers increase their sales and reach new customers by leveraging the power of the Amazon.com e-commerce platform. Partners work with Amazon Services to power their e-commerce offerings from end-to-end, including technology services, merchandising, customer service, and order fulfillment. Other branded merchants leverage Amazon.com as an incremental sales channel for their new merchandise. Over 2 million third-party sellers participate in Amazon where they offer new, used, and…

    • 891 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Bus 320 Final Paper

    • 1741 Words
    • 7 Pages

    Founded in 1995 by Jeff Bezos, Amazon.com has become one of the largest known online stores in the world. In 1995, Amazon.com sold its first book online, which was shipped from Bezos’s garage in Bellevue, Washington (Amazon.com Mission Statement, 2012). Many may not know that Amazon.com had a slow start because their online layout was not appealing. Within a few years Bezos attracted a few investors who took interest in his venture and invested approximately $140,000. Bezos decided to use the money to create a more appealing website to attract more customers. The sales for the next three years surpassed Bezos’s expectations. After analyzing the sales data, he found that people were not only purchasing domestically, but also from around the world. Amazon.com has grown from a small company to a worldwide business in just a few short years. This rapid growth requires a company to reevaluate how it does business if it plans to expand or maintain its marketplace for the future.…

    • 1741 Words
    • 7 Pages
    Better Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of Information Security (3rd ed.). Boston: Course Technology-Cengage.…

    • 939 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    In 1994, Jeff Bezos was a 30-year-old hedge fund analyst with a degree in computer science and electrical engineering from Princeton University. It was at this time Bezos decided to put his business plan in play. Jeff pulled up a file that had the business model he intended to use, which had been write in early that year in the passenger seat of a 1988 Chevy Blazer (A Retail Revolution Turns 10, 2005). Amazon.com opened its virtual doors on the World Wide Web in July 1995 and offers Earth’s Biggest Selection. The company seeks to be Earth’s most customer-centric company. Amazon.com is now a digital strip mall branching beyond books into music, DVDs, electronics and toys (Penenberg, 2000). Many people wonder how Amazon became on of the few dot-com companies to survive the dot-com bubble burst that took effect during 1997-2000. One of the best ways to evaluate Amazon’s performance is to complete a thorough review of its financial statement, pro forma financial statements, ratio analysis, return on equity, its calculated economic value added projects, and its financial policies.…

    • 2357 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT security

    • 43660 Words
    • 366 Pages

    Ethical H acking a n d C o u n te rm e a s u re s…

    • 43660 Words
    • 366 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Hacking

    • 4083 Words
    • 17 Pages

    11. McClure, Stuart. Et al. (2003), Hacking exposed: Network security secrets & solutions, Fourth edition, Berkley, California (USA), McGraw-Hill/Osborne.…

    • 4083 Words
    • 17 Pages
    Powerful Essays