inform security sys 2.4
docx
keyboard_arrow_up
School
Indiana Wesleyan University, Louisville *
*We aren’t endorsed by this school
Course
216
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
7
Uploaded by CoachGalaxyHamster27
INFORMATION SYSTEM
INFRASTRUCTURE
(CITM-502-01AFL)
Name: Fatima Begum
Monali Patel
Shaik Sohail Hussain
Mohammed Khaja Ahmed
Professor Name: Dr. Rick
Develop a comprehensive analysis that identifies threats
and vulnerabilities to the information systems
infrastructure and organizational data.
The organization that I and my group of people have selected is Amazon.
Amazon is a multinational technology company and one of the world's largest online retailers.
Founded by Jeff Bezos in 1994, Amazon initially started as an online bookstore. However, it
quickly expanded its product offerings to include a wide range of goods, including electronics,
clothing, household items, and more. Over time, Amazon became known for its customer-centric
approach, fast and reliable delivery, and extensive product selection. Today, the company
operates numerous business divisions, including e-commerce, cloud computing (Amazon Web
Services), digital streaming (Prime Video), artificial intelligence (Alexa), and more. Amazon's
success and market dominance have made it a prominent player in the global retail and
technology industries.
(
Christopher McFadden, Interestingengineering.com)
Analysis of Threats and Vulnerabilities to Amazon's Information Systems and Data:
Amazon, the popular online retailer, faces various risks to its information systems and
organizational data. Understanding these threats is crucial for safeguarding the company's
infrastructure and protecting sensitive information.
1. Cybersecurity Attacks:
a. DDoS Attacks:
Amazon's servers could be overwhelmed with excessive traffic, making its
services unavailable to customers.
b. Malware and Ransomware:
Harmful software may infect Amazon's systems, causing data
loss or demanding ransom in exchange for restoring access.
c. Phishing and Social Engineering:
Employees and customers might fall victim to scams that
trick them into sharing sensitive information or compromising system security.
d. Insider Threats:
Disgruntled employees or those with malicious intent may abuse their
access privileges to steal data, disrupt operations, or leak confidential information.
(Ben Stevens,
chargedretail.co.uk)
2. Third-Party Risks:
a. Supply Chain Vulnerabilities:
If one of Amazon's suppliers or partners is compromised, it
could affect the security and integrity of the products and services offered by Amazon.
b. Cloud Service Providers:
Amazon relies on its cloud service, called Amazon Web Services
(AWS), to power its operations. Any vulnerabilities or service disruptions in AWS could impact
Amazon's services, data, and infrastructure.
c. Vendor Security Controls:
Weak security practices by vendors or service providers could
expose Amazon's systems to unauthorized access or data breaches.
(Tinglong Dai and
Christopher S. Tang, barrons.com
)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3. Data Breaches and Privacy Concerns:
a. Customer Data Breaches:
Unauthorized access to customer information, such as personal
and financial data, could harm Amazon's reputation and result in legal consequences.
b. Regulatory Compliance:
Failing to comply with data protection regulations, such as the
GDPR or CCPA, may lead to fines and legal actions, affecting Amazon's operations and public
trust.
c. Data Retention and Disposal:
Inadequate practices for storing and disposing of data may
expose Amazon to data leakage or unauthorized access if sensitive information is not properly
handled.
4. Infrastructure and Operational Risks:
a.
Natural Disasters and Power Outages:
Amazon's data centers and infrastructure are
vulnerable to natural disasters, power outages, or technical failures, which could result in service
disruptions and potential data loss.
b.
System Failures and Technical Glitches:
Errors in software, hardware malfunctions, or
configuration mistakes can lead to service disruptions, data corruption, or loss.
c.
Scalability and Performance:
Managing Amazon's extensive infrastructure and ensuring it
can handle increasing demands is challenging. System bottlenecks or overloads may impact
operations.
5
. Regulatory and Legal Challenges:
a
. Antitrust and Competition Laws:
Amazon's dominant market position has raised concerns
about potential antitrust violations, which could result in legal actions, fines, or changes in
regulations.
b.
Intellectual Property Infringement
: Amazon may face legal challenges related to claims of
copyright or trademark infringement, which could impact its operations and brand reputation.
6
. Emerging Technologies:
a.
Artificial Intelligence and Machine Learning Risks:
The use of AI and machine learning in
Amazon's systems introduces vulnerabilities, including biases in algorithms, privacy concerns,
and potential exploitation by malicious actors.
b
. Internet of Things (IoT) Risks:
IoT devices connected to Amazon's systems, such as smart
home devices or delivery drones, may introduce security vulnerabilities and become entry points
for attackers.
Mitigation Strategies:
1. Implement strong cybersecurity measures, such as firewalls and encryption, and regularly
assess and improve system security.
2. Train employees on cybersecurity best practices, emphasizing the identification of phishing
attempts and social engineering tactics.
3. Control access to sensitive information and regularly monitor employee activities to detect and
prevent insider threats.
4. Conduct thorough assessments of third-party suppliers and partners to ensure they adhere to
security standards.
5. Keep systems and applications up to date with the latest security patches to address
vulnerabilities promptly.
6. Regularly back up critical data and test the restoration process to ensure data availability and
integrity.
7. Comply with data protection regulations and industry standards to protect customer privacy.
8. Prepare for natural disasters and infrastructure failures by diversifying infrastructure and
having effective disaster recovery plans.
9. Proactively address legal and compliance challenges, such as antitrust regulations, through
strategic approaches.
10. Assess and manage risks associated with emerging technologies like AI and IoT by
conducting security reviews and considering ethical implications.
It is important for Amazon to regularly evaluate and address these risks to effectively protect its
information systems and organizational data. This analysis provides a general overview, and
Amazon should stay updated on the latest threats and vulnerabilities to maintain robust security
measures.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References:
Are Third-Party Sellers Damaging Amazon's Customer Relationships? | Barron's (barrons.com)
The evolution of Amazon: from bookseller to tech giant (interestingengineering.com)
Amazon hit with largest DDoS cyber attack in history - Latest Retail Technology News From Across
The Globe - Charged (chargedretail.co.uk)
https://smallbusiness.chron.com/data-security-issues-amazoncom-27181.html