E-Commerce companies have become increasingly important in this era of global pandemics and resulting restrictions on businesses and individuals. Consumers are ordering products online in larger numbers than ever before due to business closures or restricted operating hours. Companies positioned in the e-Commerce industry are experiencing growth beyond previous predictions. But at the same time some E-commerce companies are seeing their business decline drastically due to travel restrictions and the reluctance of businesses and individuals to travel for any but the most critical of reasons. Added into the risk picture are risks from the actions of cybercriminals hackers and nation-state actors are taking advantage of these unsettled times resulting in increased risks for companies whose business models depend upon the Internet for financial transactions orders and communications both internal and external. For this project you will begin by researching a publicly traded company that engages in e-Commerce. Please make sure that you are using CURRENT information (2019 or later). You will then review the company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s e-Commerce operations and its risk statements about those activities you will construct and document your own cybersecurity risk analysis which focuses upon the company’s e-Commerce activities (including all supporting business processes). Requirements: 5-8 pages Review the company’s website to learn about the products and services which it sells via e-Commerce. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile. Use this URL to access the database http://ezproxy.umgc.edu/login?url=https://www.mergentonline.com/Hoovers Use the search bar at the top of the “Search & Build a List” tab to find your chosen company. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the “OneStop Report” button to generate a PDF version of the information. Select “Core” under categories (Available Fields: Company Summary Contacts Corporate Family Corporate Overview SWOT and News). Click on the field names in the middle column to select them for your report. After you have looked at the company website and the Hoovers report Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles data breach reports etc. Focus on finding information that addresses how the company is responding in the current economic environment (2019 or later) driven by the COVID-19 global pandemic and other events. Using the information obtained from your sources identify the types of information and business operations which drive this company’s need for cybersecurity products and services. (What needs to be protected?) Using the links from Table 1 (at the end of this file) download a copy of your selected company’s most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.) Read and analyze the Risk Factors section in the company’s report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information. Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information digital assets and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history. A business profile for the company. This information should include: headquarters location key personnel primary types of business activities and locations major products or services sold by the company major competitors stock information (including ticker symbol or NASDAQ code) recent financial performance and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources) An overview of the company’s e-Commerce operations which summarizes information obtained from its annual report the Hoovers profile for the company and other sources which you found in your research. A separate section in which you describe this company’s needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company’s e-Commerce activities you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities. A separate section which provides a detailed summary of the identified risks and potential impacts upon the company’s operations as a whole. What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format. Amazon http://www.amazon.com
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more