Verified Document

Zappo's Security Breach Zappos' Security Research Paper

Providing Greater Security for Customers: Two Alternatives

The most effective security strategy Amazon can take in light of the breach of their confidential data from internally is defining more rigorous role-based authentication to the data level. This would alleviate the threat of anyone in the warehouse hacking into the data sets, and would even require multiple access privileges to even see customer data (McDonald, 2011). The technologies behind these authentication techniques would also audit and report any and all potential hacking attempts including those that are unsuccessful. As second approach to minimizing threats is to completely redefine the underlying security architecture, forcing authentication through standardized security protocols, and changing the level of security layers to ensure...

The use of constraint-based technologies to capture potential hacking threats and reroute them off the site, blocking all access, is also an option (McDonald, 2011).
References

Hsieh, T. (2010, Zappos CEO on going to extremes for customers. Harvard Business Review, 88(7)

Letzing, J. (2012, Jan 16). Zappos says customer database hacked. Wall Street Journal (Online)

McDonald, S. (2011). Delivering happiness: A path to profits, passion and purpose. American Economist, 56(1), 127-128.

Shine, C. (2012, Jan 18). Zappos customers express anger, support, and frustration over security breach. McClatchy - Tribune Business News, pp. n/a.

Tsuruoka, D. (2012, Apr 03). Zappos breach a harbinger of more threats?…

Sources used in this document:
References

Hsieh, T. (2010, Zappos CEO on going to extremes for customers. Harvard Business Review, 88(7)

Letzing, J. (2012, Jan 16). Zappos says customer database hacked. Wall Street Journal (Online)

McDonald, S. (2011). Delivering happiness: A path to profits, passion and purpose. American Economist, 56(1), 127-128.

Shine, C. (2012, Jan 18). Zappos customers express anger, support, and frustration over security breach. McClatchy - Tribune Business News, pp. n/a.
Cite this Document:
Copy Bibliography Citation

Related Documents

Lessons Learned From Zappos' Security Breach in
Words: 812 Length: 3 Document Type: Essay

Lessons Learned From Zappos' Security Breach in January, 2012 On January 16, 2012 Zappos' experienced its first major security breach through a compromised server at its recently opened Kentucky Distribution Center, with an experienced hacker gaining access to potentially 24 million customer records. The Zappos' internal ordering systems had encrypted passwords for safety as part of its basic architecture, yet the last four digits of credit cards, complete customer histories and

E-Commerce and Business Process
Words: 2340 Length: 6 Document Type: Term Paper

E-Commerce and Business Process E-Commerce Defined E- commerce as modern business methodology Characteristics of internet and traditional markets Benefits of E-commerce Critical Success Factors of E-commerce E-commerce applications Types of E-commerce business models Security and legal issues Apple Company and E-commerce Business and E-Commerce Implementation of E-commerce Conventional market approach vs. modern market approach E-Commerce Applications Types of E-Commerce models E- commerce defined: E-commerce is broadly described as "utilizing online sources as well as tools to perform business in a far better way - more effectively

Overstock.com and Ecommerce Options
Words: 1710 Length: 5 Document Type: Research Paper

Overstock.com Understanding e-commerce is very important, especially for companies that are focused on providing online shopping and ordering to their customers. One of those companies is Overstock.com, which also goes by its shortened name of "O.co." Companies like Overstock do a great deal of business on the internet, and in order to be successful they have to understand the value of what they are doing and how to relate to the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now