Question

In: Operations Management

What security threats do organisations face in their e-business operations? What are the potential consequences of...

What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?

Solutions

Expert Solution

The most common security threats that are being faced by the companies and organisations bu conducting the e commerce operations in the business are the phishing attacks, data misuse, money thefts, hacking, unprotected services, privacy issues, credit card frauds and misuse of information. These security threats are common these days as the ecommerce is emerging and the management is not having enough resources to comply with the same. All of tese security threats are being followd up by the poor management in the organisation, no regulation and controls and also ineffective security providance for the data regulation in the organisation.

The potential consequences that could be seen because of these security threats are the mismanagement in the organisation, ineffective control, financial losses for the company, loss in goodwill and brand equity of the company, privacy invasion for the data and information and finally also the company could fall and terminate the business because of these threats. All of these consequences are the potential consequences which concerns and takes an account for all the risks that could happen in every scenario.

The actual risks that could arrive out of these risks would only be sufficient and only limited. The actual consequences being suffered by the company would be less than the potential ones because not every risk is covered by the actual ones. If we thought that potential could cause us 100% damage, the actual could only cause 30-40% damage because the companies have already planned and prepare themselves for some of the risks which would minimise the effects of the damage in actual scenarios.

The management strategies that are being taken by the organisation to remove or reduce the impacts of these security threats are:

1. Planning: Planning of the right standards, objectives, policies, securities is effectively taken out in the organisation. The plan should be made and implemented in the organisation in such a manner where the security threats are being critically analysed and accordingly the environment around is analysed to ensure the right implementation of the standards are done.

2. Communicating: Another strategy is the effective communication of these standards around in the business. One has to make sure to communicate the right objectives, direction and standards to the company to make sure the communication is done effectively throughout the organisation making everyone being aware about the roles and responsibilities performed.

3. Controlling: Also, regular management strategies are taken out to ensure the objectives are met and standards are achieved. The controlling activities are taken out to ensure the standards and policies are achieved to make sure the risks are reduced at large.


Related Solutions

What security threats do organisations face in their e-business operations? What are the potential consequences of...
What security threats do organisations face in their e-business operations? What are the potential consequences of these threats for organisations? Why are the actual consequences often less severe than the potential consequences? How do organisations use management strategies to address security threats?
Should organizations be concerned with internal security threats? Why? (e-business)
Should organizations be concerned with internal security threats? Why? (e-business)
What are the threats that may face production operations and what could be the possible controls...
What are the threats that may face production operations and what could be the possible controls for those threats?
What type of security on e-commerce website? To whom or to what? What are the Potential...
What type of security on e-commerce website? To whom or to what? What are the Potential threats to your website?
- What are the Windows Server threats and the security control?
- What are the Windows Server threats and the security control?
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What...
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What qualities of apps make them a vulnerable security point in smartphone use Are apps more or less likely to be subject to threats than traditional P C software programs?
There are consequences that a company will face when they do not file taxes or are...
There are consequences that a company will face when they do not file taxes or are dishonest. Find at least one case where a company did not file taxes or were dishonest. Summarize the case and discuss how the company’s indiscretions will impact business in the future.
E-business is a disruptive technology and has serious implications for the way that organisations manage their...
E-business is a disruptive technology and has serious implications for the way that organisations manage their day-to-day operations and also for their staff and the overall organisational business model. Select a specific business or organisation, examine and propose five (5) major functions or processes that require re-engineering as a result of this disruptive technology. [30 marks] With APA citation
After an initial analysis of your client’s potential security threats, the management has agreed to secure...
After an initial analysis of your client’s potential security threats, the management has agreed to secure its remote access to internal resources by rolling out a VPN and firewall solution. The client’s management team has asked that you present two proposals: an entry level and high end. For the entry level solution, feel free to look into open source technologies. For the premium recommendations, look into products from Cisco or F5. Please remember that the target audience is a non-technical...
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
What is the current state of wireless security? What are the vulnerabilities? What are the threats?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT