2017 amazons infrastructure must routinely be updated

  • University of Phoenix
  • CMGT 582
  • Essay
  • KidIronAnteater23
  • 22
  • 100% (4) 4 out of 4 people found this document helpful

This preview shows page 12 - 14 out of 22 pages.

2017). Amazon’s Infrastructure must routinely be updated with new software releases andhardware to ensure that known vulnerabilities are eliminated, and security defects remediated.According to Cisco’s 2016 Security Report, aging infrastructure is an increasing issue, leavingorganizations vulnerable to malicious attacks, breaches or exposure ("Bluelock.com", 2017).The theft or loss of Mobile Devices is a big problem for companies, Amazon included.That being, said Amazon must be prepared to deal with the loss of these devices. Employeesaccess company data via apps and as such, when employees lose or get their mobile devicesstolen, company data is also lost. As a result, the lost data stored in these lost or stolen devicesare often used to breach company systems. In addition, 46.5% of enterprises that allowemployee-owned devices to access their network have experienced a data breaches("Trendmicro.com", 2015).According to Kaspersky (2017), “Almost every type of attack contains some form ofsocial engineering.” Social engineering attacks are designed to target the trusting, unsuspectingindividual. Some of the most common ways are email phishing scams. The email is designed tolook real and when the individual clicks the link or downloads the attachment, malicious
SECURITY AUDIT PART V13software is installed and at this point it is too late. This could be detrimental to Amazon and theirclients.Amazon is always innovating on behalf of its customers, but in the same way, thecompany is always under attack from computer hackers. On several occasions the pirates haveviolated Amazon accounts using credentials stolen through the dark web. This latest attack onAmazon services is a clear example of how the use of stolen identities and credentials hasbecome a common practice for accessing other websites.The corporation is investing time and resources to strengthen the platform and createbetter cybersecurity policies, correct and improve data breaches in addition to changes such aswithholding payments to avoid frauds from their suppliers or sellers. But none of these changesand improvements will be enough if users do not take a little time to comply with some of theimprovements in password management practices implemented by Amazon.The utmost overall threat to Amazons’ corporation is interruption of business due to anatural disaster. Even though the potential risk level is low the impacts of said events could bedevastating to the business quality, operations, and financials. Amazon will need to take aholistic path in protecting their infrastructure from natural disasters as they are a part of theearth’s history.Natural disasters can consist of tornadoes, hurricanes, floods, earthquakes,tsunami, heavy snow falls, and natural fires. By taking an active approach Amazon hasdeveloped a natural disaster plan to mitigate these types of anomalies. The business goals are toassimilate the disaster recovery plan often by running through each simulated process to test and

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 22 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
N/A
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture