Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

The basis for your work will be the knowledge gained in this module related to the e-commerce security environment, the types of online security threats and related solutions, and the development of a security plan for an e-commerce vulnerability

Business Oct 04, 2022

The basis for your work will be the knowledge gained in this module related to the e-commerce security environment, the types of online security threats and related solutions, and the development of a security plan for an e-commerce vulnerability.

In order to provide your Capstone boss insight into this subject matter, you will “benchmark” another organization by reviewing the e-commerce site for a business that you purchase from, are familiar with, or would like to know more about. Include link to the site for your selected business and respond to the following questions:

  1. Describe three types of security vulnerabilities which could affect your selected business. Rank each in order of importance and provide your reasoning.
  2. Select the most important of the three vulnerabilities that you ranked in the first requirement and develop a security plan focused on eliminating or substantially reducing the potential threat. Your plan should address the following:
    1. Risk Assessment: What do you think is the probability that this threat could occur? Support your reasoning.
    1. Security Policy: Describe how you would address the action that needs to be taken to avoid the risk, the staff involved, and the amount of risk that you are willing to accept (if any). Explain why or why not.
    1. Implementation Plan: Outline the type of actions that you would need to take as well as any tools, technologies, policies, and procedures needed to achieve the acceptable levels of risk.
    1. Security Organization: Discuss how the plan would address issues such as user training, access controls, and authorization. Would all employees be provided access or would different levels of employees be permitted access to different levels? Explain.
    1. Security Audit: Describe the purpose of a security audit and the type of information that would be gained by conducting one.
  1. Search for the options made available for payment at your selected business. Describe the type of technology involved and indicate your comfort level in utilizing each if you were personally making a purchase from their site. Indicate what potential vulnerabilities could exist with two of their payment option types.
  2. Explain the benefits and risks related to cryptocurrency and indicate your comfort level as a customer in utilizing this option if it was available to you as a payment technology. 
Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment