Cmgt 400 Week 2

Topics: Security, Computer security, Information security Pages: 3 (1100 words) Published: September 17, 2013
Common Information Security Threats
University of Phoenix

The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information. Amazon.com website went online in 1995 (Byers, 2006). Amazon offers there services and products through the website Amazon.com to many countries around the world, which includes: United States, Canada, France, Spain, Japan, Italy, Germany, United Kingdom, and China (Amazon, 2012). Amazon has been around for approximately 17 years and continuous to be a successful business. One of the reason for this is because Amazon investing time in Information Security. Amazon has a massive amount of information on servers around the globe contain sensitive information, not only information for Amazon but also for Amazon’s customers. Some examples of the information Amazon maintains on the servers they own: product information, warehouse information, call center information, customer service information, service information, customer account information, bank information, cloud computing information, digital media download information, and reviews of customers for product information (Amazon, 2012). There will always be some kind of the potential risks to the information maintained by any business or person because new vulnerabilities are found every day. Just recently, on August 7, 2012, a wired magazine reporter’s information stored on his Google account, Twitter account, MacBook, iPad, and iPhone where erased without the user wanting this done. A hacker that goes by the name of Phobia comprised the reporters Amazon account with a security exploit. The security exploit allowed Phobia to access the...

References: Amazon. (2012). Amazon. Retrieved from http://www.amazon.com
Byers, A. (2006). Jeff Bezos: the founder of Amazon.com. New York, NY: The Rosen Publishing Group.
Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.
Hickey, A. R. (2011, October 28). Researchers Uncover 'Massive Security Flaws ' In Amazon Cloud. Retrieved from http://www.crn.com/news/cloud/23190911/researchers-unconver-massive-security-flaws-in-amazon-cloud.htm
Kerr, D. (2012, August 7). Amazon addresses security exploit after journalist hack. Retrieved from http://news.cnet.com/8301-1009_3-57488759-83/amazon-addresses-security-exploit-after-journalist-hack/
Vilches, J. (2012, January 16). Amazon owned Zappos hacked. Retrieved from http://www.techspot.com/news/47060-amazon-owned-zappos-hacked-24-million-accounts-compromised.html
Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Week Four CMGT 400 Essay
  • Cmgt week 2 Essay
  • CMGT 445 Week 2 IA Essay
  • Cmgt 430 Week 2 Essay
  • Essay about Cmgt 442 Week 2
  • CMGT 400 Entire Course Essay
  • CMGT 400 Complete Class Essay
  • Cmgt 400 Week 2 Common Information Security Threats Essay

Become a StudyMode Member

Sign Up - It's Free