Case Study Of Information Security Risk Assessment For Zappos

Superior Essays
Information Security Risk Assessment for Zappos.com
Zappos.com (http://www.zappos.com/) formerly known as Shoesite.com is a retail industry founded in the year 1999 originally established to offer shopping services for footwear. This public company has grown to offer other services as accessories, clothing, eyewear, housewares and beauty products, bags and handbags and gift cards.
System Characterization
The company locations are in Las Vegas, Shpherdsville and San Francisco. The types of data, information transmitted in Zappos.com include passwords and credit card numbers for online transactions.
Zappos.com uses Secure Sockets Layers (SSL) technology to enable scrambling of sensitive information and also to ensure that personal information
…show more content…
The company private policy page offers explanations on information collection, information use and disclosure, data security, opt outs and corrections and updates to policy.
Zappos domain is hosted in Virginia – Ashburn by the Amazon Europe Holding Technologies. Although there are security concerns in conducting this business, risk assessment is key to addressing these concerns, therefore, Information protection and availability, confidentiality and integrity maintenance to any information technology asset is vital in meeting program delivery
Threat Identification
Attacks on information system has become persistent and part of doing digital business in many business enterprises. Most of these threats come from the insider accounts, outsiders, the softwares and applications used in the entire business cycle.
Zappos system has recorded instances of system attack and copyright infringement and from these there were identified possible threats to the system.
Threat Source Threat Motivations/insights Threat
…show more content…
Operational controls in Zappos system include; Security reviews and audits, separation of duties together with security awareness. The management and administrative controls, includes security reviews and assessment and policy statements of the rules of behavior.
Some of the specific control analysis strategies used by Zappos are to inhibit the theft risks, File encryption mechanisms have been employed by Zappos to protect the data stored on their hard drives.
The site encourages strong passwords that cannot be easily cracked by the attackers and have also availed list of site use policies to its customers.
Control possible motives to threats by screening out potential problems before they arise Zappos always provides information when a threat has occurred through the audit trails they carry out.
They have as well provided a way to respond to the threats that have occurred in their site and did recreate applications for contingency

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Qrt2 Task 2 Case Study

    • 4418 Words
    • 18 Pages

    The client will select items from the product list and place them in the cart. When they are ready to purchase they will enter their credit card and coupon information. If the user is signed into the website their information will come up automatically; to access credit card information they will have to sign in one additional time to ensure security. Macy will also use this solution to promote a new exclusive line of products that are only available in this area via her salon. This system will provide inventory control; something that is done manually today.…

    • 4418 Words
    • 18 Pages
    Great Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Foyle Legal Case Study

    • 509 Words
    • 3 Pages

    Last updated 23 Dec 2016 Foyle Legal is committed to protecting your privacy with your rights and needs in mind. This privacy statement is aimed to provide an outline on how we handle your personal and sensitive information. Your Consent You have no obligation to disclose personal or sensitive information when you visit the Foyle Legal website.…

    • 509 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    Record360, Inc. Notice of Privacy Policy At Record360, we value your privacy and we are committed to respecting your privacy rights. We pledge to handle your personal information fairly and legally at all times. Record360 is also dedicated to being transparent about what personal information we collect and how we use it. This policy describes how we handle and use personal information; what personal information we collect; how we collect personal information; how we ensure your privacy is maintained; and your legal rights relating to your personal information.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Swot Analysis For Zulily

    • 993 Words
    • 4 Pages

    Zulily’s target customer Zulily’s target customers are young mothers who would like to purchase items for their children or for themselves. The founders of Zulily, Daren Cavens and Mark Vadon, wanted to create a business targeting young mothers because there was a large market for new moms, which was untouched by other retailers. They discovered that 4.5 million kids are born in the U.S. every year, and the only discount retailers accommodating that demographic was T.J. Maxx (Gayomali, 2015). They figured if they could compete against Tiffany & Co and undermine them with their old business, they could do something similar with an online store focusing on children’s apparel.…

    • 993 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Business and Personal Uses for Cheap Dedicated Hosting If you want to build your own website, our cheap dedicated hosting services provide affordable options for any business or personal website you might be thinking about establishing. Face it—marketing any kind of product or service or promoting your personal brand in social media depends on having a website that stays up and running 24/7. If you have an unreliable site, your business and reputation suffer. You can create a professional-quality website, separate your business and certain personal activities from your personal computer and home address, choose and register a domain name that describes your website and secure a dedicated hosting server that makes your files, products, blog…

    • 1282 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Discussions: Several discussions, debates were going on supporting and opposing net neutrality. There are advantages and disadvantages regarding this. Several regulations are also brought w.r.t protect net neutrality, but bigger corporations are still trying to oppose this free and open access of internet. Advantages and disadvantages are discussed below: Advantages: 1) No Limitations: There are no limitations on internet service usage other than the limitations proposed by the government.…

    • 828 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Toyota – Internal and External environment analysis. Internal business environment. The internal business environment is composed elements within the organization. It includes factors within that have an impact on the approach and success of your companies operations.…

    • 1423 Words
    • 6 Pages
    Great Essays