Question

In: Accounting

What security threats do organisations face in their e-business operations? What are the potential consequences of...

What security threats do organisations face in their e-business operations?
What are the potential consequences of these threats for organisations? Why
are the actual consequences often less severe than the potential
consequences? How do organisations use management strategies to address
security threats?

Solutions

Expert Solution

There are various types of threats faced by the company, such as misuse of data, online payment related risks and many others like hacking or stealing of data.Because of all these threats, the company can face a considerable loss in terms of online payment, virus attacks, phishing attacks. Due to all this, the consumer will look for other companies that can assure them that their data will be protected and in which payment gateway is secure. The company can lose its customer base, and a hacker can misuse their data.To make the potential consequences less severe, the company should consider the following steps to mitigate the effects of online operations.:-

Identification of Buyer:- The company should make sure that a customer who is purchasing the product should reveal its identity. This can be done by making the customer to register himself before placing the order.

Installation of Anti-Virus:- The company should install good antivirus which can protect the system from any kind of infection. In this way, it can help in reducing the stealing of data of consumers and helps in building the right image of the Company.

Management Strategies adopted by the company to address these threats are:-

1)Setting up of an IT Department:- The Company should create a department that handles all the online activity of the company. This includes placement of the order, online payment.

2) Making the portal of the company secure:- The company should ensure that its website portal is confident enough that no hacker can hack it.


Related Solutions

What security threats do organisations face in their e-business operations? What are the potential consequences of...
What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?
Should organizations be concerned with internal security threats? Why? (e-business)
Should organizations be concerned with internal security threats? Why? (e-business)
What are the threats that may face production operations and what could be the possible controls...
What are the threats that may face production operations and what could be the possible controls for those threats?
What type of security on e-commerce website? To whom or to what? What are the Potential...
What type of security on e-commerce website? To whom or to what? What are the Potential threats to your website?
- What are the Windows Server threats and the security control?
- What are the Windows Server threats and the security control?
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What...
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What qualities of apps make them a vulnerable security point in smartphone use Are apps more or less likely to be subject to threats than traditional P C software programs?
There are consequences that a company will face when they do not file taxes or are...
There are consequences that a company will face when they do not file taxes or are dishonest. Find at least one case where a company did not file taxes or were dishonest. Summarize the case and discuss how the company’s indiscretions will impact business in the future.
After an initial analysis of your client’s potential security threats, the management has agreed to secure...
After an initial analysis of your client’s potential security threats, the management has agreed to secure its remote access to internal resources by rolling out a VPN and firewall solution. The client’s management team has asked that you present two proposals: an entry level and high end. For the entry level solution, feel free to look into open source technologies. For the premium recommendations, look into products from Cisco or F5. Please remember that the target audience is a non-technical...
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT