Products there are many actions by employees that can

This preview shows page 5 - 7 out of 9 pages.

products. There are many actions by employees that can occur that can affect the security of theseproducts, some of these include:Installing complex Trojans that go undetected by employers.Downloading illegal content from the internet, which have a possibly to be transferred to thecompany’s network or other hardware.Deliberately installing backdoors into products.Financial RisksThe costs of manufacturing sophisticated data protection technologies are fairly high. Amazon has asteady stream of income throughout all the products and services it offers. Due to the multiple platforms,products and services it offers and improvements of all their products (Increasing different aspects of aservice can led to other security risks that need to be mitigated) can lead to an increase cost in themanufacturing budget. The increased competition all around and decline in sales can limit the availablemanufacturing budget. A decrease in the manufacturing budget can lead to them purchasing unauthorizedproducts (to suit the security standards). These purchases can increase the risk of buying devices thatcould significant security risks and allows corruption of data, data breaches or even corporate espionage.System and Technology FailuresCybersecurity suppliers rely on technological innovations in their operations. This makes suppliersvulnerable to many cybersecurity threats associated with these technological innovations. Softwaredefects, failure in machinery, and other defects can lead to manufactures selling defective technologies,
6products and services to companies. Every product, service or technology should be extensively evaluatedbefore implementation within the company to ensure not defect is detected. Even if the product comesfrom a reputable source, there is always a chance of a product being defective.Data Center SecurityMany cybersecurity suppliers and e-commerce companies have data center to store their hardware,Information Technology infrastructures and other devices. These data centers, in most cases, act as back-ups of vital and sensitive information for companies. Incase incidences occur, a company can easilyrecover information that is stored in these locations. Due to data centers being physical locations, they arevulnerable to both internal and external breaches and need to be protected by both physical and softwaresecurity measures. Data centers limit who has access to the building, certain locations within the building,and a screening process is completed before this access is granted. Many data centers have multiplephysical security measures in place to prevent unauthorized access. Amazon, for example, contains thefollowing physical security measures mixed with policies to ensure the security of datacenters:Gated entrance with security guards and a list of authorized individuals.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture