Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / The basis for your work will be the knowledge gained in this module related to the e-commerce security environment, the types of online security threats and related solutions, and the development of a security plan for an e-commerce vulnerability

The basis for your work will be the knowledge gained in this module related to the e-commerce security environment, the types of online security threats and related solutions, and the development of a security plan for an e-commerce vulnerability

Business

The basis for your work will be the knowledge gained in this module related to the e-commerce security environment, the types of online security threats and related solutions, and the development of a security plan for an e-commerce vulnerability.

In order to provide your Capstone boss insight into this subject matter, you will “benchmark” another organization by reviewing the e-commerce site for a business that you purchase from, are familiar with, or would like to know more about. Include link to the site for your selected business and respond to the following questions:

  1. Describe three types of security vulnerabilities which could affect your selected business. Rank each in order of importance and provide your reasoning.
  2. Select the most important of the three vulnerabilities that you ranked in the first requirement and develop a security plan focused on eliminating or substantially reducing the potential threat. Your plan should address the following:
    1. Risk Assessment: What do you think is the probability that this threat could occur? Support your reasoning.
    1. Security Policy: Describe how you would address the action that needs to be taken to avoid the risk, the staff involved, and the amount of risk that you are willing to accept (if any). Explain why or why not.
    1. Implementation Plan: Outline the type of actions that you would need to take as well as any tools, technologies, policies, and procedures needed to achieve the acceptable levels of risk.
    1. Security Organization: Discuss how the plan would address issues such as user training, access controls, and authorization. Would all employees be provided access or would different levels of employees be permitted access to different levels? Explain.
    1. Security Audit: Describe the purpose of a security audit and the type of information that would be gained by conducting one.
  1. Search for the options made available for payment at your selected business. Describe the type of technology involved and indicate your comfort level in utilizing each if you were personally making a purchase from their site. Indicate what potential vulnerabilities could exist with two of their payment option types.
  2. Explain the benefits and risks related to cryptocurrency and indicate your comfort level as a customer in utilizing this option if it was available to you as a payment technology. 

Option 1

Low Cost Option
Download this past answer in few clicks

18.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE