Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

E-Commerce (SHOULD BE PLAGARISM FREE ANSWER...Should not be same as in google) 1

ID: 672661 • Letter: E

Question

E-Commerce (SHOULD BE PLAGARISM FREE ANSWER...Should not be same as in google)

1. In your opinion, what were (in case of events that already happened), or can be (in case of hypothetical events in the future), the cost and impact of a cyber-security breach to the e-commerce systems in your organization/workplace/etc? If there are no e-commerce system(s) at your organization/workplace/etc, make such comments about the general information system.

Ensure to use external references and sources in your answer, as well as citing your sources.

Explanation / Answer

If we talk about the cost and impact of a cyber-security breach to the e-commerce systems in your organization/workplace/etc if there are event already happened or will be held in future it will impact major in anywhere.Privacy is important for business and customers. Continued trust in business practices, products and secure handling of your clients’ unique information impacts your profitability.Your comittment starts with a simple and clear statement describing the information you collect about customers(physical addresses, email addresses, browsing history, etc) Customers employees and even the business owners increasingly expect to make their privacy a priority. There are also a growing number of regulations protecting customer and employee privacy and often costly penalties for privacy breaches.

Let's take example of any e-commerce organization:

Wal-mart -> One of the keys to this success is the Walmart’s suppliers to directly access the inventory levels and sales information of their products at any of Walmart’s more than ten thousand stores. Using Retail Link, suppliers can analyze how well their products are selling at one or more Walmart stores, with a range of reporting options. Further, Walmart requires the suppliers to use Retail Link to manage their own inventory levels. If a supplier feels that their products are selling out too quickly, they can use Retail Link to petition Walmart to raise the levels of inventory for their products. This has essentially allowed Walmart to “hire” thousands of product managers, all of whom have a vested interest in the products they are managing. This revolutionary approach to managing inventory has allowed Walmart to continue to drive prices down and respond to market forces quickly.

Today, Walmart continues to innovate with information technology. Using its tremendous market presence, any technology that Walmart requires its suppliers to implement immediately becomes a business standard.

In -ecommerce sites are directly connect and operate with customer.All the customer information available in database.This includes payment information such as credit or debit card numbers and verification codes, billing and shipping addresses,email addresses, phone numbers, purchasing history,buying preferences and shopping behavior.Website can be a great place to collect information – from transactions and payments to purchasing and browsing history, and even newsletter signups, online enquiries and customer requests.This data must be protected, If you collect data through a website hosted by a third party, be sure that third party protects that data fully. Apartfrom applying all the other precautions that have been described, such as classifying data and controlling access, need to make sure any data collected through website and stored by the third party is sufficiently secure. Thatmeans protection from hackers and outsiders as well as employees of that hosting company.

If there are no e-commerce system(s) at your organization/workplace/etc, make such comments about the general information system.Then also cyber security is most important .

No matter what kind of data you have, you must control access to it. The more sensitive the data, the more restrictive the access. As a general rule, access to data should be on a need-to-know basis. Only individuals whohave a specific need to access certain data should be allowed to do so.Once you’ve classified your data, begin the process of assigning access privileges and rights – that means creating a list of who can access what data, under what circumstances, what they are and are not allowed to do with it and how they are required to protect it.