Zappo's Security Breach Zappos' Security Research Paper

PAGES
5
WORDS
1563
Cite
Related Topics:

Providing Greater Security for Customers: Two Alternatives

The most effective security strategy Amazon can take in light of the breach of their confidential data from internally is defining more rigorous role-based authentication to the data level. This would alleviate the threat of anyone in the warehouse hacking into the data sets, and would even require multiple access privileges to even see customer data (McDonald, 2011). The technologies behind these authentication techniques would also audit and report any and all potential hacking attempts including those that are unsuccessful. As second approach to minimizing threats is to completely redefine the underlying security architecture, forcing authentication through standardized security protocols, and changing the level of security layers to ensure...

...

The use of constraint-based technologies to capture potential hacking threats and reroute them off the site, blocking all access, is also an option (McDonald, 2011).

Sources Used in Documents:

References

Hsieh, T. (2010, Zappos CEO on going to extremes for customers. Harvard Business Review, 88(7)

Letzing, J. (2012, Jan 16). Zappos says customer database hacked. Wall Street Journal (Online)

McDonald, S. (2011). Delivering happiness: A path to profits, passion and purpose. American Economist, 56(1), 127-128.

Shine, C. (2012, Jan 18). Zappos customers express anger, support, and frustration over security breach. McClatchy - Tribune Business News, pp. n/a.


Cite this Document:

"Zappo's Security Breach Zappos' Security" (2012, May 24) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/zappo-security-breach-zappos-security-58267

"Zappo's Security Breach Zappos' Security" 24 May 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/zappo-security-breach-zappos-security-58267>

"Zappo's Security Breach Zappos' Security", 24 May 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/zappo-security-breach-zappos-security-58267

Related Documents

Lessons Learned From Zappos' Security Breach in January, 2012 On January 16, 2012 Zappos' experienced its first major security breach through a compromised server at its recently opened Kentucky Distribution Center, with an experienced hacker gaining access to potentially 24 million customer records. The Zappos' internal ordering systems had encrypted passwords for safety as part of its basic architecture, yet the last four digits of credit cards, complete customer histories and

E-Commerce and Business Process E-Commerce Defined E- commerce as modern business methodology Characteristics of internet and traditional markets Benefits of E-commerce Critical Success Factors of E-commerce E-commerce applications Types of E-commerce business models Security and legal issues Apple Company and E-commerce Business and E-Commerce Implementation of E-commerce Conventional market approach vs. modern market approach E-Commerce Applications Types of E-Commerce models E- commerce defined: E-commerce is broadly described as "utilizing online sources as well as tools to perform business in a far better way - more effectively

Overstock.com Understanding e-commerce is very important, especially for companies that are focused on providing online shopping and ordering to their customers. One of those companies is Overstock.com, which also goes by its shortened name of "O.co." Companies like Overstock do a great deal of business on the internet, and in order to be successful they have to understand the value of what they are doing and how to relate to the