SOLUTION: CSIA 350 UMUC Acquisition Risk Analysis of eBay Customer Retail Model Essay

Running Head: RISK MANAGEMENT STRATEGY FOR eBAY
Risk Management Strategy for eBay
Executive Summary
Ecommerce is a business format that takes an online-based presence to avail products to
the consumers. Thus, consumers can get products through the internet based purchase. (Atalay,
1
RISK MANAGEMENT STRATEGY FOR eBAY
2
2020). eBay is a leading eCommerce firm that offers online retail services, ensuring that
customers can order and receive the products across the globe. It is famous for online vendors to
use as a business channel and accessible in many nations globally. It was established in 1995 by
founder Pierre Omidyar who aimed at making a little online sale administration, and the Auction
Web was dispatched in 1995 during the Labor Day. The company had the potential for electronic
business. It began testing its potential with an online commercial centre that would exchange
merchandise with other enterprises. Hence it realized that it could get more customers from the
local settings.
Thus, Omidyar, who intrigued his undertaking, would succeed in the future. eBay was an
aspect of the hobby that grew to a significant company. The first online deal was a game-changer
that later led to rising volumes of sales. It began gaining from the eCommerce supplier and
demanded that he change to a business account because of the developing number of purchasers
and vendors (Toleuuly et al., 2020)). In the wake of exchanging into a business web account, the
month to month web bill developed from $30 to $250, which drove Omidyar to begin charging
eBay clients for leading organizations on the webpage and the Users joyfully paid which had
driven the organization to develop in a fast pace. It had made at least 250,000 sales by 1996 for
various categories such as Beanie Babies, stamps, coins, and PCs. In a single quarter of 1998,
eBay’s raised strikingly as it advanced and changed, recording gross item arrangements of $100
million and wages of $6 million. By 2001, eBay enrolled clients reach about 43 million clients.
In 2019, it was estimated to enjoy sales up to $22 billion/
Risk Management Profile
RISK MANAGEMENT STRATEGY FOR eBAY
3
Risk management profile aids in risk analysis by identifying threats and vulnerabilities
and understanding their weight and level. Understanding risks can be vital to any business (deGusmão et al., 2018). It faces numerous risks that include identity theft, phishing, credit fraud,
and unauthorized access for eBay. Credit Card Fraud, where clients lose card data and are
utilized to buy something on the web. Information gotten because of actual illicit admittance to
the data workers is another considerable challenge that undermines the users’ privacy (Ghosh,
2020). Phishing is applied in gathering the user’s data that would be used maliciously where their
details such as login are stolen. Malware is dangerous programs that contaminate computer
systems for the benefit of the attackers.
Thus, it is necessary to adopt various risk mitigation practices. There is need to0 have an
Access control as a security strategy that directs who or what can see computing envir0omnment.
Data Security is a technique for securing information, data sets, and records on an organization
by embracing many controls and applications. Issues such as DOS may occur where they affect
the traffic of users. Such a threat may lead to enormous losses for the eCommerce firm. Assault
happen when genuine clients cannot get to data frameworks, gadgets, or other organization assets
due to malicious activities (Atalay, 2020). The firm also needs to have intrusion detection and
prevention systems. The IDS and IPS aids in ensuring that any vulnerability issue is detected
before it makes progress that affects the system and network. The IPS allows the system to
determine the issue, leaving the system secure, and activities can continue smoothly. With the
systems, it will counter any dubious action and risks. In dealing with the data theft, they have
ready mechanisms to counter the issues aids in ensuring integrity, confidentiality and availability
of data.
Risk Profile Table
4
RISK MANAGEMENT STRATEGY FOR eBAY
The Risk Profile Table is essential in ensuring that the company can classify them
accordingly. It presents the eBay’ potential cybersecurity-related risks (Almuhammadi &
Alsaleh, 2017). So far, the company has confronted them in many ways as it seeks to ensure
system safety. The table lists risks and ways that they may be addressed.
Risk
Risk
ID
Risk Mitigation
Implementation:
NIST
Sub-Category
Strategy
Required
Cybersec
Description
(description)
Technologies,
urity
Products, or
Framewo
Services
rk
Category
and Sub
Category
Identifier
(e.g.
ID.AM1)
001
Data
Placement of
Advancement of
PR.AC-2
Physical access
accessed
servers in a
access control
(NIST,
to assets is
through
secure room and
measures such as
n.d)
managed and
physical
location.
security cameras in
protected.
a server room.
Protection and
access to
servers
management of
access to
physical assets.
5
RISK MANAGEMENT STRATEGY FOR eBAY
002
Privacy
Promoting client
Security
DE.CM
Network
Issues
information
application and
control, service
safety protecting
control of
provider issues,
from issues such
malicious attacks.
vulnerability
as spamming and
scan and device
identity theft
privacy
(Jenab &
monitoring.
Moslehpour,
2016).
005
Malware
Creation of risk
Workers are
PR.AT-1
Informing and
awareness
training on how to
allowing
avoid risks such as
workers.
spam emails and
unknown links.
006
Data
Enhance the data
Data Security
PR.DS
Protect data
Security
security measures
from integrity
by encryption and
checks, data
other safety
leaks and test it
methods that will
to ensure its
promote its
safety from
privacy.
malicious
content.
007
Data theft
Access permit to
Applying check
various
procedures
PR.AC-4
Protection of
Data at rest
employees
008
Intrusion
Intrusion
Apply IPS and IDS
and
detection and
devices to fix
firewall for the
Detection
border safety
vulnerabilities
system’s
services
DE. DP-1
Implement a
protection
6
RISK MANAGEMENT STRATEGY FOR eBAY
009
Network
Implementation
Acquire the IDS
DE.CM-7
Surveillance on
compromi of IDS to identify
for network
cybersecurity
sed by an
attacks (Jenab &
monitoring
issues
outsider.
Moslehpour,
2016).
010
DOS

Attacks
Users’ frequency
Frequency-use
DE.AE-1
Establishment
of use limited
rules set to offer
of the network’s
and 24/7 network
access limits to
actions that are
monitoring.
certain aspects.
well managed
For instance, it can
to ensure safe
limit a person’s
information
login use by
flow
setting sessions.
Acquisition Forecast
Acquisition Forecast serves as a critical policy that aids the company to consider current
and future opportunities. Any mitigation strategy comes at a cost that needs to be considered to
control its expenditure. Generally, it expenses can take an extravagant aspect. However, it is
imperative to an online business to capacity to its incomparable capacities. Besides, a portion of
the danger recognized above is very much kept up by eBay. However, not many that are missing
behind can seriously postpone an organization’s cycles the size of eBay (de-Gusmão et al., 2018).
Its ability to offer and manage employee training and avail users’ guide on the risks affecting its
security aspect allows it to make a significant step to overcome cybersecurity issues.
Summary and Conclusions
RISK MANAGEMENT STRATEGY FOR eBAY
7
eBay operates as an eCommerce platform that allows B2B, C2C, and B2C business
operations, models. Thus, it acts as a link between manufacturers, wholesalers, retailers and
consumers. It offers products in various classes hence making it a reliable online marketplace
(Atalay, 2020). Wholesalers can auction the products so that more customers can place a bid. As
the development of innovation increments and how individuals purchase stuff has made, the
web’s utilisation has likewise increment. Nonetheless, eBay clients understand that they send
data through the online platform. Considering the NIST cybersecurity framework, eBay must
ensure that it identifies the risks, detect their occurrences, protects users and system, respond in
case of a successful attack and have recovery mechanisms to promote quick resumption. Hence,
their several risks faced which mostly encompasses on the cybersecurity issues. The purchaser’s
faith in eBay and need to have a sense of safety that it will not undermine their data and eBay to
perceived existing and potential risks and have the option to address them will help shape
customer trust in the brand-building customer dedication. Thus, having the risk profile table
allows a company to have a non-abstract risk’s comprehension by allocating mathematical norms
to factors addressing various risks and their vulnerability to eBay. Thus, the firm can evaluate the
risk and respond with adequate security measures to counter them.
RISK MANAGEMENT STRATEGY FOR eBAY
References
Almuhammadi, S., & Alsaleh, M. (2017). Information security maturity model for the NIST
cybersecurity framework. Computer Science & Information Technology (CS & IT), 7(3),
51-62.
Atalay, T. (2020). E-commerce ecosystem: Fundamental concepts, business models and
cybersecurity issue. International Journal of Business Ecosystem & Strategy (26872293), 2(2), 15-24.
De Gusmão, A. P. H., Silva, M. M., Polito, T., e Silva, L. C., & Costa, A. P. C. S. (2018).
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory.
International Journal of Information Management, 43, 248-260.
eBay (n.d.) Executive Leaders. Retrieved from https://www.ebayinc.com/company/our-leaders/
Ghosh, K. (2020). Identification and Quantification of Cybersecurity Risk by LikelihoodSeverity, Incident-Response and Organizational Asset Valuation Framework. IncidentResponse and Organizational Asset Valuation Framework (June 18, 2020).
Jenab, K., & Moslehpour, S. (2016). Cybersecurity management: A review. Business
Management Dynamics, 5(11), 16.
NIST. (n.d). Cybersecurity Framework. Retrieved from
https://www.nist.gov/cyberframework/online-learning/five-functions
Toleuuly, A., Yessengeldin, B., Khussainova, Z., Yessengeldina, A., Zhanseitov, A., &
Jumabaeva, S. (2020). Features of E-Commerce Risk Management in Modern
Conditions. Academy of Strategic Management Journal, 19(1), 1-6.
8
Running Head: RISK MANAGEMENT STRATEGY FOR eBAY
Risk Management Strategy for eBay
Executive Summary
Ecommerce is a business format that takes an online-based presence to avail products to
the consumers. Thus, consumers can get products through the internet based purchase. (Atalay,
1
RISK MANAGEMENT STRATEGY FOR eBAY
2
2020). eBay is a leading eCommerce firm that offers online retail services, ensuring that
customers can order and receive the products across the globe. It is famous for online vendors to
use as a business channel and accessible in many nations globally. It was established in 1995 by
founder Pierre Omidyar who aimed at making a little online sale administration, and the Auction
Web was dispatched in 1995 during the Labor Day. The company had the potential for electronic
business. It began testing its potential with an online commercial centre that would exchange
merchandise with other enterprises. Hence it realized that it could get more customers from the
local settings.
Thus, Omidyar, who intrigued his undertaking, would succeed in the future. eBay was an
aspect of the hobby that grew to a significant company. The first online deal was a game-changer
that later led to rising volumes of sales. It began gaining from the eCommerce supplier and
demanded that he change to a business account because of the developing number of purchasers
and vendors (Toleuuly et al., 2020)). In the wake of exchanging into a business web account, the
month to month web bill developed from $30 to $250, which drove Omidyar to begin charging
eBay clients for leading organizations on the webpage and the Users joyfully paid which had
driven the organization to develop in a fast pace. It had made at least 250,000 sales by 1996 for
various categories such as Beanie Babies, stamps, coins, and PCs. In a single quarter of 1998,
eBay’s raised strikingly as it advanced and changed, recording gross item arrangements of $100
million and wages of $6 million. By 2001, eBay enrolled clients reach about 43 million clients.
In 2019, it was estimated to enjoy sales up to $22 billion/
Risk Management Profile
RISK MANAGEMENT STRATEGY FOR eBAY
3
Risk management profile aids in risk analysis by identifying threats and vulnerabilities
and understanding their weight and level. Understanding risks can be vital to any business (deGusmão et al., 2018). It faces numerous risks that include identity theft, phishing, credit fraud,
and unauthorized access for eBay. Credit Card Fraud, where clients lose card data and are
utilized to buy something on the web. Information gotten because of actual illicit admittance to
the data workers is another considerable challenge that undermines the users’ privacy (Ghosh,
2020). Phishing is applied in gathering the user’s data that would be used maliciously where their
details such as login are stolen. Malware is dangerous programs that contaminate computer
systems for the benefit of the attackers.
Thus, it is necessary to adopt various risk mitigation practices. There is need to0 have an
Access control as a security strategy that directs who or what can see computing envir0omnment.
Data Security is a technique for securing information, data sets, and records on an organization
by embracing many controls and applications. Issues such as DOS may occur where they affect
the traffic of users. Such a threat may lead to enormous losses for the eCommerce firm. Assault
happen when genuine clients cannot get to data frameworks, gadgets, or other organization assets
due to malicious activities (Atalay, 2020). The firm also needs to have intrusion detection and
prevention systems. The IDS and IPS aids in ensuring that any vulnerability issue is detected
before it makes progress that affects the system and network. The IPS allows the system to
determine the issue, leaving the system secure, and activities can continue smoothly. With the
systems, it will counter any dubious action and risks. In dealing with the data theft, they have
ready mechanisms to counter the issues aids in ensuring integrity, confidentiality and availability
of data.
Risk Profile Table
4
RISK MANAGEMENT STRATEGY FOR eBAY
The Risk Profile Table is essential in ensuring that the company can classify them
accordingly. It presents the eBay’ potential cybersecurity-related risks (Almuhammadi &
Alsaleh, 2017). So far, the company has confronted them in many ways as it seeks to ensure
system safety. The table lists risks and ways that they may be addressed.
Risk
Risk
ID
Risk Mitigation
Implementation:
NIST
Sub-Category
Strategy
Required
Cybersec
Description
(description)
Technologies,
urity
Products, or
Framewo
Services
rk
Category
and Sub
Category
Identifier
(e.g.
ID.AM1)
001
Data
Placement of
Advancement of
PR.AC-2
Physical access
accessed
servers in a
access control
(NIST,
to assets is
through
secure room and
measures such as
n.d)
managed and
physical
location.
security cameras in
protected.
a server room.
Protection and
access to
servers
management of
access to
physical assets.
5
RISK MANAGEMENT STRATEGY FOR eBAY
002
Privacy
Promoting client
Security
DE.CM
Network
Issues
information
application and
control, service
safety protecting
control of
provider issues,
from issues such
malicious attacks.
vulnerability
as spamming and
scan and device
identity theft
privacy
(Jenab &
monitoring.
Moslehpour,
2016).
005
Malware
Creation of risk
Workers are
PR.AT-1
Informing and
awareness
training on how to
allowing
avoid risks such as
workers.
spam emails and
unknown links.
006
Data
Enhance the data
Data Security
PR.DS
Protect data
Security
security measures
from integrity
by encryption and
checks, data
other safety
leaks and test it
methods that will
to ensure its
promote its
safety from
privacy.
malicious
content.
007
Data theft
Access permit to
Applying check
various
procedures
PR.AC-4
Protection of
Data at rest
employees
008
Intrusion
Intrusion
Apply IPS and IDS
and
detection and
devices to fix
firewall for the
Detection
border safety
vulnerabilities
system’s
services
DE. DP-1
Implement a
protection
6
RISK MANAGEMENT STRATEGY FOR eBAY
009
Network
Implementation
Acquire the IDS
DE.CM-7
Surveillance on
compromi of IDS to identify
for network
cybersecurity
sed by an
attacks (Jenab &
monitoring
issues
outsider.
Moslehpour,
2016).
010
DOS

Attacks
Users’ frequency
Frequency-use
DE.AE-1
Establishment
of use limited
rules set to offer
of the network’s
and 24/7 network
access limits to
actions that are
monitoring.
certain aspects.
well managed
For instance, it can
to ensure safe
limit a person’s
information
login use by
flow
setting sessions.
Acquisition Forecast
Acquisition Forecast serves as a critical policy that aids the company to consider current
and future opportunities. Any mitigation strategy comes at a cost that needs to be considered to
control its expenditure. Generally, it expenses can take an extravagant aspect. However, it is
imperative to an online business to capacity to its incomparable capacities. Besides, a portion of
the danger recognized above is very much kept up by eBay. However, not many that are missing
behind can seriously postpone an organization’s cycles the size of eBay (de-Gusmão et al., 2018).
Its ability to offer and manage employee training and avail users’ guide on the risks affecting its
security aspect allows it to make a significant step to overcome cybersecurity issues.
Summary and Conclusions
RISK MANAGEMENT STRATEGY FOR eBAY
7
eBay operates as an eCommerce platform that allows B2B, C2C, and B2C business
operations, models. Thus, it acts as a link between manufacturers, wholesalers, retailers and
consumers. It offers products in various classes hence making it a reliable online marketplace
(Atalay, 2020). Wholesalers can auction the products so that more customers can place a bid. As
the development of innovation increments and how individuals purchase stuff has made, the
web’s utilisation has likewise increment. Nonetheless, eBay clients understand that they send
data through the online platform. Considering the NIST cybersecurity framework, eBay must
ensure that it identifies the risks, detect their occurrences, protects users and system, respond in
case of a successful attack and have recovery mechanisms to promote quick resumption. Hence,
their several risks faced which mostly encompasses on the cybersecurity issues. The purchaser’s
faith in eBay and need to have a sense of safety that it will not undermine their data and eBay to
perceived existing and potential risks and have the option to address them will help shape
customer trust in the brand-building customer dedication. Thus, having the risk profile table
allows a company to have a non-abstract risk’s comprehension by allocating mathematical norms
to factors addressing various risks and their vulnerability to eBay. Thus, the firm can evaluate the
risk and respond with adequate security measures to counter them.
RISK MANAGEMENT STRATEGY FOR eBAY
References
Almuhammadi, S., & Alsaleh, M. (2017). Information security maturity model for the NIST
cybersecurity framework. Computer Science & Information Technology (CS & IT), 7(3),
51-62.
Atalay, T. (2020). E-commerce ecosystem: Fundamental concepts, business models and
cybersecurity issue. International …
Purchase answer to see full
attachment

Order a unique copy of this paper
(550 words)

Approximate price: $22

Our Basic features
  • Free title page and bibliography
  • Plagiarism-free guarantee
  • Unlimited revisions
  • Money-back guarantee
  • 24/7 support
Our Options
  • Writer’s samples
  • Expert Proofreading
  • Overnight delivery
  • Part-by-part delivery
  • Copies of used sources
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

AcademicWritingCompany guarantees

Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.

Money-back guarantee

Academicwritingcompany.com always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, always

Read more

Zero-plagiarism tolerance guarantee

The paper that you order at academicwritingcompany.com is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.

Read more

Free-revision guarantee

The Academicwritingcompany.com thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.

Read more

Privacy and Security policy

With Academicwritingcompan.com, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.

Read more

Adherence to requirements guarantee

The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2020 at 10:52 AM
Total price:
$26
The price is based on these factors:
Customer Academic level
Number of pages required
Urgency of paper