0% found this document useful (0 votes)
5 views9 pages

CMGTCB556 Competency 3 Assessment

The document outlines an assignment to analyze a security breach scenario involving LifeLock, focusing on the risks of using social security numbers in advertising and the implications for SCM, CRM, and ERP systems. It emphasizes the need for robust security measures, such as multi-factor authentication and encryption, to prevent breaches and protect sensitive data. Additionally, it suggests a marketing campaign to restore customer trust by highlighting the company's commitment to data security and educating customers on cybersecurity best practices.

Uploaded by

Dan Mshefah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views9 pages

CMGTCB556 Competency 3 Assessment

The document outlines an assignment to analyze a security breach scenario involving LifeLock, focusing on the risks of using social security numbers in advertising and the implications for SCM, CRM, and ERP systems. It emphasizes the need for robust security measures, such as multi-factor authentication and encryption, to prevent breaches and protect sensitive data. Additionally, it suggests a marketing campaign to restore customer trust by highlighting the company's commitment to data security and educating customers on cybersecurity best practices.

Uploaded by

Dan Mshefah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Assignment Directions

Review Scenario 5, "LifeLock: Keeping Your Identify Safe” in the “Making Business

Decisions” section of “Business Plug-In B6: Information Security” in Business Drive

Technology.

Based on the scenario, do additional research to identify ways to limit security threats.

Then write a 2- to 3-page analysis of the identity scenario that does the following:

• Answers, from a security perspective, if you would use your social security number

in advertising.

• Describes the security breach in the scenario.

• Discusses how the security threat is harmful to SCM, CRM, ERP systems.

• Evaluate the type of measures related to enterprise models you would use to avoid

such a breach.

• Describes the type of marketing campaign you would use to avoid this type of

exposure.

• Describes the influence the internet has on enterprise data and how enterprise models

can help solve business problems. Format any references according to APA guidelines.
CMGTCB/556 Competency 3 Assessment

Student’s name

Institution

Instructor

Date
From a security perspective, if you would use your social security number in

advertising.

From a security perspective, using one's social security number in advertising is an

unequivocal risk that should be categorically avoided. Social security numbers are sensitive

and unique; therefore, identity thieves want them. Advertising this information risk’s identity

theft, financial fraud, and account hacks. Exposure may bring long-term financial and

reputational loss for individuals and legal concerns for companies. Social security numbers

should be secured to safeguard privacy and prevent unlawful usage. Company data is at risk

from social security number advertising (Chadwick et al., 2020). Data security and

stakeholder trust are compromised. To secure sensitive data and avoid unnecessary exposure

that might compromise human and organizational security, businesses must prioritize privacy

standards.

Describes the security breach in the scenario

The security breach described in the scenario involves the theft of a laptop which

contains personal information. Name, address, Social Security number, and credit card

information were taken, placing the client at risk of identity theft and financial fraud.

LifeLock alerted the customer that an unauthorized user had accessed their account,

disclosing the breach. This reveals that LifeLock's authentication and encryption are weak,

allowing unauthorized access. Poor security, software problems, or failure to quickly fix

known vulnerabilities may have caused LifeLock's vulnerability. Leaks may have been caused

by targeted cyberattacks or malware. For the cause, the intrusion highlights the necessity for
effective cybersecurity and regular upgrades. Strong authentication, encryption, and proactive

monitoring should detect and stop unauthorized access to reduce data breach harm.
How the security threat is harmful to SCM, CRM, ERP systems.

Security risks threaten SCM, CRM, and ERP systems. SCM client addresses and

payment card information may compromise supply chain integrity. This vulnerability might

lead to fraud, unlawful shipping and delivery data access, and counterfeit product entrance

into the supply chain. A compromised SCM system may lose supplier and customer trust,

creating disruptions, financial losses, and reputational damage. Customer data theft in CRMs

may be devastating. A security breach that reveals sensitive data like Social Security numbers
and credit card details may impair CRM customer confidence (Humayun et al., 2020).

Targeted phishing attacks employing stolen CRM data may cause further breaches or identity

theft. Customers may avoid a compromised company, hurting sales and loyalty. ERP security

concerns may hinder business process integration. ERP financial and operational data

breaches may cause inaccurate reporting, financial losses, and regulatory noncompliance.

Integration makes SCM, CRM, and ERP systems exposed to security breaches. Protecting

these critical business systems requires strong cybersecurity.

Evaluate the type of measures related to enterprise models you would use to

avoid such a breach

Preventing security breaches like the scenario requires enterprise model controls.

Corporate systems require robust authentication and access controls first. Only authorized

users may access sensitive data using multi-factor authentication and role-based access
restrictions. Client data should be encrypted at all transit and storage levels in case of a

compromise. Security audits and vulnerability assessments should be done routinely to

resolve enterprise model concerns. Additionally, proactive threat detection and response are

crucial. Intrusion detection and advanced security monitoring software should identify

suspicious business system activities (Yaacoub et al., 2020). Real-time monitoring and

automatic alerts decrease security incidents by reacting rapidly to threats. Regular staff

cybersecurity training promotes a security-conscious culture. Workers understanding the risks

of handling sensitive information and their involvement in security may reduce human

vulnerabilities. These strategies may improve business security and prevent invasions.

Type of marketing campaign you would use to avoid this type of exposure.

A coordinated marketing push should emphasize the company's data security and

privacy commitment to minimize security breach damage and restore customer trust. The

campaign should start with honest, timely information about the occurrence, breach, and

proactive response. Here, advanced encryption, authentication, and cybersecurity

infrastructure investment are involved. Highlighting the company's industry standards and

data protection certifications reassures customers that it surpasses security criteria. Marketing

should also educate customer’s cybersecurity hygiene. The company's website, newsletters,

and social media outlets may educate customers on account and personal data security. Offer

discounts or additional security features for proactive security measures like multi-factor

authentication to security-conscious consumers. Continuous development, transparency, and

customer-led security may help the organization recover from unanticipated disasters.
Describes the influence the internet has on enterprise data and how enterprise

models can help solve business problems.

Internet speed, accessibility, and connection have changed business data management.

Data flow via the Internet enables real-time organizational collaboration and decision-making.

But increased connectivity puts company data at risk of security attacks, making data

protection more important than ever. Enterprises require advanced cybersecurity to protect

their data from unauthorized access, cyberattacks, and other risks in the linked digital world.

Companies may use the internet's promise with cloud computing and data analytics.

Companies may store and retrieve data remotely via cloud computing, boosting flexibility and

scalability without expensive on-premise infrastructure (Enache, 2023). Internet-powered data

analytics improves corporate decisions and efficiency by analyzing large datasets. Enterprise

models streamline services, encourage cooperation, and integrate processes. Companies may

use the internet's revolutionary capacity to solve problems, improve performance, and remain

competitive in the digital era by proactively changing these enterprise models.


References

Chadwick, D. W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., ... &

Wang, X. S. (2020). A cloud-edge based data security architecture for sharing and

analysing cyber threat information. Future generation computer systems, 102, 710-

722.

Enache, G. I. (2023). Security Management in the Context of Supply Chains Technological

Upgrades. In Proceedings of the International Conference on Business

Excellence (Vol. 17, No. 1, pp. 200-212).

Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber

security threats and vulnerabilities: a systematic mapping study. Arabian Journal for

Science and Engineering, 45, 3171-3189.

Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones

systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218.

You might also like