Course Hero Logo

Team B Week6 Security Audit, Part V.docx - SECURITY AUDIT...

  • University of Phoenix
  • CMGT 582
  • Essay
  • KidIronAnteater23
  • 22
  • 100% (4) 4 out of 4 people found this document helpful

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 22 pages.

SECURITY AUDIT PART V1Security Audit – Part VCMGT582 / Security and Ethics
SECURITY AUDIT PART V2Introduction:Valuable tools such as security audits are used to ensure the establishment is workingwithin best practice guidelines whichkeeps the framework secure. Security audits areimplemented to help identify vulnerable areas within the organization infrastructure that maylead to system intrusions. Security audits are standard metrics used to evaluate, the businesssecurity policies, data systems, hardware, software, data processing, user best practices and toestablish that the organization conforms to a set of established guidelines to ensure they areconfigured and protected by regulatory compliances.Company Description:Amazon.com, Inc. offers online merchandising shopping services. It delivers assistanceto four primary customer groups: customers, vendors, businesses, and content makers. Also, thecompany recommends additional marketing and promotional support, for instance, onlinepublicity and co-branded credit card contracts.It assists clients through its retail websites with aconcentrate on selection, cost, and suitability. It creates its sites to allow its merchandises to bemarketed by the firm and by third parties within lots of product groups. The corporation alsodistributes developers and businesses of all sizes through Amazon Web Services, which deliversentrance to technology infrastructure ("Forbes.com," 2017).Legal and Regulatory Compliance:Amazon is a global entity, and with such a significant impact on the world, there is somuch at stake. Amazon employs over 382k employees worldwide (Lavy, 2017). With so manyemployees around the globe, legal matters will always be hard to navigate. Counterfeit parts arealso a significant concern. It is impossible to stop all of them, and Amazon has a very user-
SECURITY AUDIT PART V3friendly guarantee to keep it that way. Amazon does not pay sellers until they are sure customersreceived the products they ordered (Amazon, 2017).Amazon has an exhaustive list of trademarks, and many of their products are built allover the world. According to Amazon (2017), "We partner closely with our suppliers to drivecontinuous improvement in worker conditions. We train our suppliers on the standards andconduct required by our Supplier Code. We use independent auditors to audit suppliers andverify compliance, including through confidential worker interviews."This attention to detail isessential to protect against any legal action due to any inhuman working conditions.Computer Crimes:Amazon like most companies that has a heavy reliance on information technology faces anew wave of ethical issues. Internet confidentiality, electronic contact, and computerinfringements have added a new level of moral problems that afflicts companies that utilizeInformation technology every day. These difficulties must be address and resolved if Amazon isto be a successful company. Over the next four weeks, as part of a security audit, Amazon will

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 22 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture