Introduction The risk assessment and analysis is indispensable for any e-commerce for the purpose of information security Uomo Nike Air Max TN Nere Fluorescent Verde Scontate , whereby it helps an enterprise to establish a safeguard system for their business. It is the process of for affirming risks and their extent and it forms the foundation for risk management (Youli et al., 2009). Risk assessment and analysis provide vital data for establishing security policies for organizations. Risk assessment and analysis help define security demand and create a feasible measure for controlling risks so that they do not exceed acceptable extents and also to avoid system down. It is a fact that security is core to e-commerce as the network is rapidly developing and different net risks are coming up; that is why risk assessment and analysis is crucial. The paper is about conducting of risk assessment and analysis for an e-commerce business concerned with the sale of electronic products. Risk analysis for the business entailed the identification of assets and the threats likely to impact the functionality of those assets negatively. According to priority levels of the IT assets, for our company, there was the production of the following table. The prioritization of the assets when carrying out risks analysis is vital for the purpose of understanding the protection mechanisms to deploy (Stern & Arias Donne Nike Air Max 90 PRM EM Rosse Nere Scontate , 2011). That is because the failure of the critical systems can totally hamper the business processes. The network assets in the table include switches, routers, NICs, firewalls Uomo Nike Air Max 90 VT Marina Scontate , and gateways. The PCs and printer included those from HP Company because of their dominance in the market and their workability suitability for the business environment.
鈥?br > Asset identification
Asset identification worksheet Form AID01 Business Name: Dotcom Electronic Inc Address: 1234 NY Facility 001 Contact: 257890988 Phone Number: 518-402-5181 E-mail: DotcEinc@ Asset Quantity Department Value Priority Backup system 2 All $800 Necessary PCs 50 All $11000 Necessary Servers 6 Server Room $4800 Critical Network devices 20 - $500 Necessary Printers 10 All $1100 Desirable Scanner 5 All $615 Desirable QuickBooks 5 Accounting and payroll $400 Critical Data 500TB All $2000 Critical CRM 1 Sales and marketing, Customer relations and support $200 Necessary Web 1 Research and development, sales and marketing, customer relations and support $300 Critical
Business process identification There was the identification of the business process through the interaction with the various departments of the organization Uomo Nike Air Max DLX 2019 Nere Rosse Scontate , and the result was the following table. Then company engaged in the customer m management, research and innovation, and those activities related to sales and marketing as well as other managerial activities. I realized that the company continues to protect their information because data is very important for the continuity of any business and its loss can culminate to the closure of the business. I listed the departments where the various business processes took place and assigned priority levels of the business processes and the assets used where applicable. The assignment of priority levels is essential for the purpose knowing how to support such activities to ensure the business success.
Business Process Identification Worksheet Form BPID01
Business Name: Dotcom Electronic Inc Address: 1234 NY Facility 001 Contact: 257890988 Phone Number: 518-402-5181 E-mail: DotcEinc@ Business process Priority Department Asset used Managing of customer information Necessary Sales and marketing CRM Procurement Critical Sales and marketing NA Managing accounts Critical Accounting and payroll QuickBooks Securing Enterprise data Necessary Administrative (tech support) Servers, Firewall Providing innovative business techniques Necessary Research and development Web Collect money from clients Critical Accounting and payroll NA Receiving and processing sales Critical Sales and marketing QuickBooks Backing up enterprise data Necessary Sales and marketing Backup system Updating customers with information Desirable Customer relations and support CRM
Threat identification and assessment Threat identification and assessment is key to having preparedness for addressing those threats (Bayne Uomo Nike Air Max DLX 2019 Triple Nere Scontate , 2002). I used various sources to conduct the identification and analysis. I listed then assets that each particular threat can have impact on and the consequence if there are an occurrence such incidents. Some of the threats include software failures, fire outbreak, denial of service attacks, natural catastrophes like earthquake and floods Uomo Nike Air Max DLX 2019 Bianche Nere Scontate , civil unrest, computer hacking or fraud, theft, malware Golden Goose Deluxe Brand Superstar Distressed Uomo Bianche Scontate , etc. There is the listing of the priority of occurrence so as to help the organization in question to know where to put emphasis and which assets to give priority when putting security measures in place. There is labeling of the consequence of the attacks and the severity levels of the outbreaks.
Threat Identification and Assessment worksheet Form TIDA01 Business Name: Dotcom Electronic Inc Address: 1234 NY Facility 001 Contact: 257890988 Phone Number: 518-402-5181 E-mail: DotcEinc@ Threat POC Assets affected Consequence (C, S, M, I) Severity (C nike sf air force 1 scontate , S, M, I) Software failure 3 CRM, QuickBooks M M Natural catastrophes 2 Infrastructure nike air force 1 mid scontate , PCs, network devices, printers and scanners C C Theft 5 Infrastructure, PCs M M Malware 7 Data S C Computer hackingfraud 7 Data S C Fire outbreak 3 Infrastructure nike air force 1 high scontate , PCs, network devices C C Civil unrest 1 Infrastructure I M Denial of s