CMGTCB556 Competency 3 Assessment
CMGTCB556 Competency 3 Assessment
Review Scenario 5, "LifeLock: Keeping Your Identify Safe” in the “Making Business
Technology.
Based on the scenario, do additional research to identify ways to limit security threats.
Then write a 2- to 3-page analysis of the identity scenario that does the following:
• Answers, from a security perspective, if you would use your social security number
in advertising.
• Discusses how the security threat is harmful to SCM, CRM, ERP systems.
• Evaluate the type of measures related to enterprise models you would use to avoid
such a breach.
• Describes the type of marketing campaign you would use to avoid this type of
exposure.
• Describes the influence the internet has on enterprise data and how enterprise models
can help solve business problems. Format any references according to APA guidelines.
CMGTCB/556 Competency 3 Assessment
Student’s name
Institution
Instructor
Date
From a security perspective, if you would use your social security number in
advertising.
unequivocal risk that should be categorically avoided. Social security numbers are sensitive
and unique; therefore, identity thieves want them. Advertising this information risk’s identity
theft, financial fraud, and account hacks. Exposure may bring long-term financial and
reputational loss for individuals and legal concerns for companies. Social security numbers
should be secured to safeguard privacy and prevent unlawful usage. Company data is at risk
from social security number advertising (Chadwick et al., 2020). Data security and
stakeholder trust are compromised. To secure sensitive data and avoid unnecessary exposure
that might compromise human and organizational security, businesses must prioritize privacy
standards.
The security breach described in the scenario involves the theft of a laptop which
contains personal information. Name, address, Social Security number, and credit card
information were taken, placing the client at risk of identity theft and financial fraud.
LifeLock alerted the customer that an unauthorized user had accessed their account,
disclosing the breach. This reveals that LifeLock's authentication and encryption are weak,
allowing unauthorized access. Poor security, software problems, or failure to quickly fix
known vulnerabilities may have caused LifeLock's vulnerability. Leaks may have been caused
by targeted cyberattacks or malware. For the cause, the intrusion highlights the necessity for
effective cybersecurity and regular upgrades. Strong authentication, encryption, and proactive
monitoring should detect and stop unauthorized access to reduce data breach harm.
How the security threat is harmful to SCM, CRM, ERP systems.
Security risks threaten SCM, CRM, and ERP systems. SCM client addresses and
payment card information may compromise supply chain integrity. This vulnerability might
lead to fraud, unlawful shipping and delivery data access, and counterfeit product entrance
into the supply chain. A compromised SCM system may lose supplier and customer trust,
creating disruptions, financial losses, and reputational damage. Customer data theft in CRMs
may be devastating. A security breach that reveals sensitive data like Social Security numbers
and credit card details may impair CRM customer confidence (Humayun et al., 2020).
Targeted phishing attacks employing stolen CRM data may cause further breaches or identity
theft. Customers may avoid a compromised company, hurting sales and loyalty. ERP security
concerns may hinder business process integration. ERP financial and operational data
breaches may cause inaccurate reporting, financial losses, and regulatory noncompliance.
Integration makes SCM, CRM, and ERP systems exposed to security breaches. Protecting
Evaluate the type of measures related to enterprise models you would use to
Preventing security breaches like the scenario requires enterprise model controls.
Corporate systems require robust authentication and access controls first. Only authorized
users may access sensitive data using multi-factor authentication and role-based access
restrictions. Client data should be encrypted at all transit and storage levels in case of a
resolve enterprise model concerns. Additionally, proactive threat detection and response are
crucial. Intrusion detection and advanced security monitoring software should identify
suspicious business system activities (Yaacoub et al., 2020). Real-time monitoring and
automatic alerts decrease security incidents by reacting rapidly to threats. Regular staff
of handling sensitive information and their involvement in security may reduce human
vulnerabilities. These strategies may improve business security and prevent invasions.
Type of marketing campaign you would use to avoid this type of exposure.
A coordinated marketing push should emphasize the company's data security and
privacy commitment to minimize security breach damage and restore customer trust. The
campaign should start with honest, timely information about the occurrence, breach, and
infrastructure investment are involved. Highlighting the company's industry standards and
data protection certifications reassures customers that it surpasses security criteria. Marketing
should also educate customer’s cybersecurity hygiene. The company's website, newsletters,
and social media outlets may educate customers on account and personal data security. Offer
discounts or additional security features for proactive security measures like multi-factor
customer-led security may help the organization recover from unanticipated disasters.
Describes the influence the internet has on enterprise data and how enterprise
Internet speed, accessibility, and connection have changed business data management.
Data flow via the Internet enables real-time organizational collaboration and decision-making.
But increased connectivity puts company data at risk of security attacks, making data
protection more important than ever. Enterprises require advanced cybersecurity to protect
their data from unauthorized access, cyberattacks, and other risks in the linked digital world.
Companies may use the internet's promise with cloud computing and data analytics.
Companies may store and retrieve data remotely via cloud computing, boosting flexibility and
analytics improves corporate decisions and efficiency by analyzing large datasets. Enterprise
models streamline services, encourage cooperation, and integrate processes. Companies may
use the internet's revolutionary capacity to solve problems, improve performance, and remain
Chadwick, D. W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., ... &
Wang, X. S. (2020). A cloud-edge based data security architecture for sharing and
analysing cyber threat information. Future generation computer systems, 102, 710-
722.
Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber
security threats and vulnerabilities: a systematic mapping study. Arabian Journal for
Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones