Preview

Common Information Security

Good Essays
Open Document
Open Document
1196 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Common Information Security
Common Information Security
CMGT/400
Iwona Rusin
June 29th, 2015
Brandon Smith

While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.
The three major security threats here would be stealing information from the store itself while inside or outside that contains employee or customer information based on sales or work history. Second would be using the online store to obtain the same information plus more because it has shipping details as well stored on there for sales being made. Thirdly being able to take both of those attacks and further them by tracing bank accounts and credit accounts to gain access to unlimited amounts of money from the store, clients, and employees. As for techniques and processes I think it’s best to have constant 100% all time security on guard such as protection services, cameras, guards, etc. This is in place to mainly guard the physical stores from theft of products and other suspicious persons, for the online part you can have firewalls, passwords, account information, plus much more to protect and lockdown all the accounts and sales information behind multiple walls to safeguard it from unwanted eyes. It’s always best to have daily checks into security details and scans of the system to make sure nothing was attempted to be accessed or was accessed, this helps keep an

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3445 Project part 1

    • 317 Words
    • 1 Page

    First off e-commerce is one of the best things for business whether you have your whole business through the web or partly. If you have a physical store, you are limited by the area that you can sell your product or offer service. An ecommerce website opens your business to the world. In addition to these two drivers,online retail is also driven by traffic from search engines. One of the most important positives of ecommerce is the lowered cost. A part of these lowered costs could be passed on to customers in the form of discounted prices. Advertising and marketing is global and you get a better buying market. For personnel use the automation of checkout, billing, payments, inventory management, and other operational processes, lowers the number of employees required to run an ecommerce setup. last but not least Real estate, the store does not need a prominent physical location. you can Locate the Product Quicker, eliminate travel time and cost, provide comparison shopping, also cross reference deals, bargains, coupons, and group buying.if you do open a e-business vulnerabilities that need to be taken into account if you decide to create an e-commerce site is security internal and external. Hackers attempting to steal customer information or disrupt the site or server containing customer information that is stolen. Also Imposters can mirror your ecommerce site to steal customer's money. authorized administrators/users of an ecommerce website downloading hidden active content need to watch the attacks on ecommerce system. Scans should be frequently done on your server. this will help identify any malicious programs that may be running worms, viruses or Trojan horses. Limited user access will ensure that you know exactly who has access to your ecommerce system and assign each user with unique access authentication method.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Acquiring a large time lock safe for each store and not having the local bank deliver funds daily would save money from the bank fees. Each store could make a nightly deposit from the sales and keep a small amount of cash in the drawers. This will reduce the chances of theft and it would also make accounting for money easier.…

    • 844 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If a hacker is trying to hack your e-commerce site the disclosure of confidential data can occur. Confidential data includes application specific data such as credit card numbers, employee details, and financial records. If your e-commerce site has been hacked you could experience damage some of the damage you might incur is the hacker could illegally use user accounts and privileges. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin. They could steal your hardware, steal software, run code to damage your systems, run code to damage, and corrupt your data, modify data that you have stored, steal your data, use your data for financial gain or for industrial espionage, perform actions that prevents legitimate authorized users from accessing network services and resources, perform actions to deplete network resources and bandwidth. To protect your e-commerce site you could use encryption to secure pages when processing orders and payments. Use authenticated SSL certificates, so a visitor to your site will then have the assurance that you are what you claim to be. Use digital certificates or business cookies because they will give you a unique Internet identity, like an ID or passport. Use anti-fraud solution to protect from Trojan horses, viruses, and worms.…

    • 298 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions; however, our collaborative discussion stressed three. Our team reviewed the benefits of updating POS…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    An online store is where consumers can purchase and view products over the internet which are then delivered to the customers choice of location. It is an immediate service which is open 24 hours a day.…

    • 3487 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Shoplifting is one of the most invaluable crimes that businesses face today. When merchandise is stolen and revenue is lost, some retailers are forced to raise their prices (Lashon Fryer). Shoplifting is big business for business owners. Small businesses are sometime not able to withstand the loss from theft and are forced to close due to profit loss. The rate of thefts increases based on several economical downfalls such as, more…

    • 1589 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Online shopping – this could lead to the loss of private information like card numbers and passwords and leading to identity fraud.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays