Sample Paper on Incident Reporting and Management for Online Business

Hardware Security Management and Incident Reporting and Management for Online Business

There are different business units that heavily depend on technology. This is because technology is critical in the operations of the business as it enhances efficiency within the departments of an organization. Most businesses use Information Technology in a number of ways within their establishments. In consumer goods and services, most businesses rely on technology to drive their sales by creating an environment where certain consumer products can be purchased by anyone that has access to the Internet. This is enabled by online virtual retailers who create an efficient marketing and selling process via a network of computers (Using Technology, n.d). This has driven electronic consumer trade with the emergence of online e-commerce platforms where products and services can be purchased from the comfort of homes.

Technology has led to the emergence of newer technologies that are used to facilitate the exchange of goods and services on online platforms. According to Forrester’s research, it is estimated that most households in North America make purchases from online retail stores, with the online retail segment having registered impressive sales amounting to close to $300 billion. This has also led to the emergence of online Internet auction sites where products are offered at subsidized rates. Other than this, technology has also established mechanisms that protect consumers by implementing security features on online stores that guarantee a secure transaction process (Privacy and Security, n.d).
Online advertising and marketing is another segment in the consumer services industry in retailers depend on to display their available products and services. This has been facilitated through the use of search engines and direct marketing techniques that use email as a means of reaching potential clients (Online Advertising and Marketing, n.d).

For instance, email marketing has become the norm in the current business environment where sales executives use spam to market their consumer goods and services.
Despite the many benefits brought about by technology. It is imperative that businesses establish proper security plans to help mitigate against attacks that target the computing infrastructure, such as the online e-commerce system. The plan should outline the contingency plans describing how to safeguard employees and customer data from unauthorized access by intruders. These plans need also to adhere to information security best practices in safeguarding an enterprise-wide information system. There is a need to implement a security policy that outlines how different resources can be accessed and outlines how access levels are to be configured by using access control mechanisms (Whitman & Mattford, 2012), as outlined within the security plan. On the other side, a risk assessment plan is critical to ensure that the present information security controls adhere to industry standards, comply with organizational access policies, and are working effectively within the organization. There is a need also to employ information security personnel who will ensure that information system access policies are not violated and ensure people conform to set access policies within the organization.
It is also important that an incident response system be deployed within an organization that will help design an effective security incident escalation procedure that aims to solve any incident that occurs within the organization. This can be implemented by an incidence reporting alarm (Kouns & Minoli, 2010), to alert the management of the occurrence of an incidence within the enterprise. This will help in event consolidation and incidence identification in order to establish a comprehensive incidence plan, as a countermeasure to incidences.

References

Kouns, J., & Minoli, D. (2010). Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams. Hoboken, N.J: Wiley.

Online Advertising and Marketing | BCP Business Center. (n.d.). Online Advertising and Marketing | BCP Business Center. Retrieved April 24, 2014, from http://business.ftc.gov/advertising-and-marketing/online-advertising-and-marketing

Privacy and Security | BCP Business Center. (n.d.). Privacy and Security | BCP Business Center. Retrieved April 24, 2014, from http://business.ftc.gov/privacy-and-security

Using Technology | SBA.gov. (n.d.). Using Technology | SBA.gov. Retrieved April 24, 2014, from http://www.sba.gov/category/navigation-structure/starting-managing-business/managing business/running-business/using-technology

Whitman, M. E., & Mattord, H. J. (2012). Principles of information security. Boston, MA: Course Technology.