Verified Document

Zappo's Security Breach Zappos' Security Research Paper

Providing Greater Security for Customers: Two Alternatives

The most effective security strategy Amazon can take in light of the breach of their confidential data from internally is defining more rigorous role-based authentication to the data level. This would alleviate the threat of anyone in the warehouse hacking into the data sets, and would even require multiple access privileges to even see customer data (McDonald, 2011). The technologies behind these authentication techniques would also audit and report any and all potential hacking attempts including those that are unsuccessful. As second approach to minimizing threats is to completely redefine the underlying security architecture, forcing authentication through standardized security protocols, and changing the level of security layers to ensure...

The use of constraint-based technologies to capture potential hacking threats and reroute them off the site, blocking all access, is also an option (McDonald, 2011).
References

Hsieh, T. (2010, Zappos CEO on going to extremes for customers. Harvard Business Review, 88(7)

Letzing, J. (2012, Jan 16). Zappos says customer database hacked. Wall Street Journal (Online)

McDonald, S. (2011). Delivering happiness: A path to profits, passion and purpose. American Economist, 56(1), 127-128.

Shine, C. (2012, Jan 18). Zappos customers express anger, support, and frustration over security breach. McClatchy - Tribune Business News, pp. n/a.

Tsuruoka, D. (2012, Apr 03). Zappos breach a harbinger of more threats?…

Sources used in this document:
References

Hsieh, T. (2010, Zappos CEO on going to extremes for customers. Harvard Business Review, 88(7)

Letzing, J. (2012, Jan 16). Zappos says customer database hacked. Wall Street Journal (Online)

McDonald, S. (2011). Delivering happiness: A path to profits, passion and purpose. American Economist, 56(1), 127-128.

Shine, C. (2012, Jan 18). Zappos customers express anger, support, and frustration over security breach. McClatchy - Tribune Business News, pp. n/a.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Breach Case Scenario 1: Security Breach
Words: 1969 Length: 7 Document Type: Essay

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Security Breach at Target
Words: 580 Length: 2 Document Type: Essay

Computer Security Breaches Internal Controls and Receivables On December the 19th Target publicly acknowledged they had suffered a data breach, which had resulted in the loss of 40 million customer payment card details, along with their names, expiry dates, and the encrypted security codes (Munson, 2013), At the time this was one of the largest security breaches, with the firm suffering not just because they were targeted by criminals, but as a

E-Mail Security Breach Why Did
Words: 894 Length: 3 Document Type: Research Paper

The next thing is to immediately contact the FOIP Coordinator, Privacy Officer, Responsible Affiliate as well as any other person who is responsible for the organization's it security. Evaluation of the Risks Associated with the Breach There is a need to evaluate the risks associated with the privacy breach. This should be done with a consideration of personal as well as health information (Social Insurance Number, financial information or any other

Lessons Learned From Zappos' Security Breach in
Words: 812 Length: 3 Document Type: Essay

Lessons Learned From Zappos' Security Breach in January, 2012 On January 16, 2012 Zappos' experienced its first major security breach through a compromised server at its recently opened Kentucky Distribution Center, with an experienced hacker gaining access to potentially 24 million customer records. The Zappos' internal ordering systems had encrypted passwords for safety as part of its basic architecture, yet the last four digits of credit cards, complete customer histories and

Ipad's Security Breach
Words: 1458 Length: 5 Document Type: Essay

IPad Security Breach and Corporate Ethics In the course of this short essay, the author will demonstrate hacking into a Web site is almost never justifiable unless the hackers are acting with a warrant and under the direction of law enforcement agencies. We will see this applied to a real world case, in which Goatse Security and Gawker Media hacked into iPAD email records stored on an AT&T server in June

VA Security Breach the Veteran's Affairs Department
Words: 577 Length: 2 Document Type: Essay

VA Security Breach The Veteran's Affairs department has had several notable security breeches in recent years. In one 2006 incident, patient data was downloaded onto an unsecured laptop and stolen. Patient records at the VA were unencrypted at the time. "If data is properly encrypted there is no data breach. The device can be stolen but no data can be accessed" because the thief lacks the 'key' to decode the data

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now