Course Hero Logo

CMGT582 Team Assignment Security Audit (Part I) v1.3.doc -...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 7 pages.

Security Audit – Part 11Security Audit – Part 1CMGT582 / Security and EthicsChad Randolph, David Dustman, Justin Hitchcock, Manuel Chavez, Stepan S SaburkinProfessor: William GlassenApril, 1st2019
Security Audit – Part 12Introduction:Security audits is one of a major tools to help identify vulnerable areas of companyinfrastructure. Also, security audits are standard metrics used to review and evaluate businesssecurity policies, systems that being in use (software or interface) / desktops and other hardwareas well as data processing to establish that the organization follow to a set of guidelines to ensurethey are protected by regulatory compliances. Security audits also helps to measure businessenvironment through vulnerability review / scanning, series of interviews.Company Description:Amazon.com, Inc. offers online merchandising shopping services. It delivers assistanceto four primary customer groups: customers, vendors, businesses, and content makers. Also, thecompany recommends additional marketing and promotional support, for instance, onlinepublicity and co-branded credit card contracts.It assists clients through its retail websites with aconcentrate on selection, cost, and suitability. It creates its sites to allow its merchandises to bemarketed by the firm and by third parties within lots of product groups. The corporation alsodistributes developers and businesses of all sizes through Amazon Web Services, which deliversentrance to technology infrastructure ("Forbes.com," 2017).Security-related Legal and Regulatory Compliance:Amazon has evolved from an online book seller during the 90’s to a titan of e-commercebusiness covering the entire world which includes everything from logistics, payments,hardware, data storage and media (Gershgorn, Griswold, Murphy, Coren, & Kessler, 2017). Ithas now expanded far beyond books and now provides online shoppers and merchants a place tobuy and sell anything and everything. Now, Amazon has managed to maintain a dominantposition in e-commerce by creating a complex logistics focused strategy. Not only that, but
Security Audit – Part 13Amazon is a dominant force in cloud computing and cloud hosting in which Amazon supports alarge portion of the actual internet with its subsidiary company Amazon Web Services. When youbundle those three aspects together you have an organization that is poised to completely

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A
Tags
Information Security, Amazon Web Services

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture