Discussion: Security Threats


Oh no, you are late for work! You rush to get out the door but leave your front door wide open. It is hot and your car AC is broken, so you ride with the windows down. You put your wallet, phone, and lunch on the seat. As soon as you are pulling into the parking lot at work, your boss motions you over to the electric vehicle charging station. You hop out of your car thinking you will come right back, so you leave the keys. Your boss continues to talk to you as you walk into the building. Three hours later, you realize you left your keys, wallet, and phone in your car, without protecting any of it. This scenario seems unlikely because of the obvious risk of inviting others to take your unlocked and unprotected valuables. So, we need to make sure that we provide protection for the e-Commerce solutions we are proposing instead of leaving the business and customers at great risk.

Create a table following the format in the example below, filling in the columns and rows, and post it to the discussion.

Identify at least six security threats and define each with an example that you find online, have heard about in the news, or have experienced yourself. Include the dimension of security, as well as a reason why you categorized the threat in that dimension. Choose a tool that could have prevented the threat or will prevent that threat in the future.

Security Threat Identify at Least Six Security Threats and Define with an Example Dimension of e-Commerce Security and Why Tool Prevention for Previous and/or Future Threats
Security Threat 1      
Security Threat 2      
Security Threat 3      
Security Threat 4      
Security Threat 5      
Security Threat 6      

When you respond to your peers, focus on the tools, as well as the strengths and weaknesses of those tools. Just because you have a number of tools, does not guarantee security.


Response Parameters

Prompts for this course are not opinion questions and should, therefore, be supported with scholarly sources. You can use the textbook, but that does not count as your obtained scholarly source.

Scholarly sources should be from current peer-reviewed journal articles (published within the last 36 months) and support your content. So, one of your sources for each of your main posts needs to be published in a valid scholarly journal within the last 36 months—older will not “count” as your supporting source. However, you may include older sources, in addition to more current ones, to further support your posts.

The Proposal requires you to propose a solution that will be supported with sources, as you will be asking to be funded. The discussions allow you to practice this approach. Scholarly sources carry more weight, as they have been validated. Wikipedia, for example, is not a valid source for an academic environment.

Peer responses should also be supported with sources that can be from the textbook, peer-reviewed journal articles, and other reputable sources.


· Posts should be 300 words in length

· A minimum of one obtained scholarly source is needed, and it should be included in the reference list at the end of the post

· All content from the source should be properly cited or quoted in the post, using APA or MLA format. Reminder that quoted content should make up no more than 20% of your post and should be reserved for content, such as statistics and dollar amounts. Overusing an author’s exact words, such as including block quotations to meet word counts, may lead your readers to conclude that you lack appropriate comprehension of the subject matter or that you are neither an original thinker nor a skillful writer.

Order your essay today and save 10% with the discount code ESSAYHELP