Course Hero Logo

The increased competition all around and decline in

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 5 - 7 out of 9 pages.

The increased competition all around and decline in sales can limit the available manufacturing budget. Adecrease in the manufacturing funding can lead to them purchasing unauthorized products (to suit thesecurity standards). These purchases can increase the risk of buying devices that could significantlyimpact security risks and allow the corruption of data, data breaches, or even corporate espionage.System and Technology FailuresCybersecurity suppliers rely on technological innovations in their operations. This makes suppliersvulnerable to many cybersecurity threats associated with these technological innovations. Softwaredefects, failure in machinery, and other defects can lead to manufactures selling defective technologies,
6products, and services to companies. Buyers should extensively evaluate every product, service, ortechnology before implementing it in the company to ensure no defect is detected. Even if the productcomes from a reputable source, there is always a chance of being defective.Data Center SecurityMany cybersecurity suppliers and e-commerce companies have data centers to store their hardware,Information Technology infrastructures, and other devices. These data centers, in most cases, act as back-ups of vital and sensitive information for companies. Incase incidences occur, a company can quicklyrecover information that is stored in these locations. Due to data centers being physical locations, they arevulnerable to internal and external breaches and need to be protected by physical and software securitymeasures. Data centers limit who has access to the building, specific locations within the building, and ascreening process are completed before this access is granted. Many data centers have multiple physicalsecurity measures in place to prevent unauthorized access. Amazon, for example, contains the followingphysical security measures mixed with policies to ensure the security of data centers:Gated entrance with security guards and a list of authorized individuals.Entrances that require an employee badge to enter the building.Mantraps in the entryway of the building does not allow piggybacking.Policies that each employee must badge and walk all the way through mantraps before anotherindividual can go through or an alarm will be sounded.Individuals must remove all smart devices (Phones, smartwatches, laptops, music playingdevices, flash drives, etc.) before going through the next security measure.Before being able to access the server rooms, individuals are checked over by security. Anindividual must empty all pockets and are gone over by a metal detector wand.Once the security has cleared an individual, they must then go through another man trap, leadingto another open area, then the server rooms.These security measures ensure that an unauthorized individual with not be able to enter, andauthorized individuals will have a difficult time corrupting any information (if they had malicious intent).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture