Question

In: Economics

You intend to maintain your e-commerce company's information security services in-house. What operations are these? What...

You intend to maintain your e-commerce company's information security services in-house. What operations are these? What skills does your security team need to have? How can you tell that doing this is better than outsourcing?

Solutions

Expert Solution

let's divide the answer into three points

  1. Information security services operations in E-commerce companies- The most significant aspect of Information security services operations is choosing the right host and addition of the SSL security. The e-commerce organizations are fully responsible for customer's data stored which gets stored on their servers and websites such as the history of their credit card transactions. To take care of all these things an operation is present in an e-Commerce company that consists of different parts.

Advisory & Telecommunications Department - Advisory & Accreditation Branch, Telecommunications Branch Security Technology Branch

Network Security Department -Monitoring & Detection Branch, Trend Analysis & Attribution branch, Security Analysis Branch

Policy Department - Communication & Policy Branch, Threat Assessment Branch

2. Skills required by in-house information security services -

  • Administering Information Security Software and Controls
  • Experience With Intrusion Prevention Systems and Tools
  • Producing Situational and Incident-Related Reports
  • Responding to Security Events
  • Supporting and Managing Security Services
  • In-depth knowledge of Risk Management Frameworks
  • Process set up in order to Manage Network Security
  • Discovering Vulnerabilities in Information Systems
  • Evaluating and Deconstructing Malware Software
  • Familiarity with Security Regulations and Standards
  • Maintenance and implementation of security protocols for a new and existing system
  • Information Technology Knowledge
  • Improving Security Efficiency
  • Installing Firewall and Data Encryption Programs
  • Compliance Analysis
  • Analyzing Security Tools, and Security System Logs
  • Conducting Technical and Cyber Threat Analyses

3. Benefits of setting up in-house information security service team -

  1. It is convenient to have an in-house information security service team for face-to-face communication. If any difficulty comes up, your IT security specialist is correct down the corridor rather than in any other outsourced firm.
  2. The hiring of a permanent in-house information security service team for the role permits them to become an integral member of your team. With this sort of engagement, the organization and information security team become reciprocally invested within each other, that works to everyone’s advantage. whereas outsourcing professionals care concerning their work, in-house staff have an additional unconditional and current interest in tending to the health of an organization and may work on proactive measures to market a secure computing setting.
  3. Regarding intellectual property, you can trust your in-house team more easily rather than an outsourced team.

Related Solutions

What type of security on e-commerce website? To whom or to what? What are the Potential...
What type of security on e-commerce website? To whom or to what? What are the Potential threats to your website?
With the growth of e-commerce (the buying and selling of information, products and services via computer...
With the growth of e-commerce (the buying and selling of information, products and services via computer networks), there is a rapid advancement in the use of e-contracts; however the deployment of electronic contracts poses a lot of challenges at three levels, namely conceptual, logical and implementation.  Discuss the scope, nature, legality and other issues related to e-contracts using supporting resources and examples. This assignment relates to the following Course Learning Requirements: CLR 1: Compare strategies used to manage risks in...
What is e-commerce? Electronic commerce draws on technologies such as ? The main stages that e-commerce...
What is e-commerce? Electronic commerce draws on technologies such as ? The main stages that e-commerce passes through three stages ? Types of e-commerce ? Challenges in the e-commerce ? Traditional Commerce vs E-commerce? "with reference "
What e-commerce security requirements the work principle of digital signature can provide?
What e-commerce security requirements the work principle of digital signature can provide?
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked you to research two network firewalls. In this regard, you have to create a table by comparing features of firewalls in terms of filtering methods (stateless or stateful filtering), additional features these firewalls support (IDS, content filtering, etc.), and the cost of each firewall. Which one you would recommend to your supervisor? Justify your answer. please give answer in tabular form
length 1200 words: Question; What is your opinion of e-business and e-commerce and their roles in...
length 1200 words: Question; What is your opinion of e-business and e-commerce and their roles in today’s world of business? Analyse a case study to support your ideas.
Explain the use of e-commerce and global information systems.
Explain the use of e-commerce and global information systems.
please describe the work principle of digital signature. what e commerce security requiremets it can provide?...
please describe the work principle of digital signature. what e commerce security requiremets it can provide? PLEASE HELP ASAP THANKS
2) Select an e-commerce company & based on the information you found on their website, briefly...
2) Select an e-commerce company & based on the information you found on their website, briefly 0. Describe their business model 15 pts. 1. Identify their customer value proposition 15 pts. 2. Identify its revenue model 15 pts. 3. Identify their main competitors 15 pts. 4. Identify their market strategy 20 pts
Activity 2: E-Commerce TASKS 2.1 Identify an online e-commerce store of your choice and clearly show...
Activity 2: E-Commerce TASKS 2.1 Identify an online e-commerce store of your choice and clearly show with evidence how they are abiding or diverting from the South African Protection of Personal Information Act 4 of 2013. 2.2 E-commerce stores adopt different Payment Systems for Electronic Commerce. Identify the different payment methods adopted by any clothing online store of your choice. Provide evidence supporting your responses. 2.3 Highlight security measures that have been adopted by e-commerce stores in South Africa and...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT