Costco Risk Assessment

Great Essays
Assessment of Security Risks at Costco Wholesale
This portfolio project report contains the relevant organizational information of Costco Wholesale Corporation, which is a wholesale giant in the United States. The primary intention of this report is to highlight the basic organizational location and financial information, along with the computing and network infrastructure details to help layout the detailed structure of an Information Technology (IT) risk assessment report. As part of the risk assessment report, the key elements emphasized are the threats and vulnerabilities that are possible in the current system and architecture; based on the vulnerabilities, the risks that are likely to occur; and the suggestions to identify and mitigate
…show more content…
Privacy and confidentiality of the users and the security of business information are of utmost importance for the company, which is heavily dependent on inventory management software, monstrous databases, e-commerce applications with financial transactions, and complex network and web architectures spanning across multiple countries. In 2012, Costco understood the importance of technology progression, and as a result, advanced and improved their entire Information System (IS) architecture which also includes moving towards the cloud computing based architecture (Barnes, 2013). Moreover, in the plan published by Costco for their upcoming $3 billion investments for 2016, a big portion of this will be spent on the ecommerce infrastructure development (Kalogeropoulos, 2015). In another crucial IT decision, Costco in 2011, entered into a cloud computing based Electronic Health Record (EHR) business, priced at $599 per doctor per month (Terry, …show more content…
In 2008, with 1200 servers and multiple AS/400 mainframe computers, approximately 95 percent of the computers in the Costco’s data center had Windows operating system, while the overall network consists of 13,000 HP thin clients, and 9,000 end user customers (Microsoft, 2008). The scope of this report is to accentuate the risks involved with these critical IS components of cloud computing and virtualization, Windows operating system, databases; and the e-commerce and network applications, along with the ways to control and mitigate them based on the guidelines provided by Blank and Gallagher,

Related Documents

  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Operational and Financial Change Model Effectively implementing the electronic health record requires a large amount of strategic and financial planning. Point of View, (2012) states that operational models are essential toward bridging the gap between strategic and financial planning. The traditional financial services operational model is a model that I would employ during this transitional process. Baptist Health is a community centered healthcare organization, and must remain up to date when planning and providing healthcare services to the surrounding community. Financially, Baptist Health desires to provide the highest level of quality care in the most cost effective manner.…

    • 1008 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Problem Statement: Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”.…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Current Status of EHRs 1. What are EHRs? EHR is an acronym that stands for Electronic Health Record. EHRs are digital collections of vital patient information such as medical history, treatments, and medication use.…

    • 653 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As Maxistar Medical Supplies Company develops and extends operations it turns out to be progressively critical to keep IT operations secure while likewise empowering the business to rapidly and adequately address client issues. Amid a late appraisal Maxistar recognized a few changes that should have been be executed to their IT operations to secure their business to adjust to administrative and lawful consistency for the Payment Card Industry (PCI), HIPAA, and NIST 800-53 principles. As a major aspect of this evaluation, a few known dangers were recognized and 5 regions particularly were focused as the start of Maxistar's Security and Compliance program. This record will plot those dangers and the rules for our arrangement to carry Maxistar…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    As there might be a large number of vulnerabilities and associated threats that could disturb the assets, it is also important to be properly categorize them. The main objective is to find out which vulnerabilities and threats might cause the maximum damage so that the critical items can be taken care on the priority basis. Measuring the possibility and impact of the potential threats on the business To evaluate possible losses caused by threats, the following questions need to be…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    This can be one of the hardest steps because it can be difficult thinking about vulnerabilities the system might have. Today’s technology is advancing at a rapid rate, which makes it difficult to keep up with the new threats, viruses, and vulnerabilities that come with it. A few examples for Wells Fargo can be; poorly trained employees, disgruntle employee, power outage, breach on the servers, misconfigurations, natural disasters, and many others. If someone where able to breach any server, irreparable damage could be caused as well as confidential information stolen. A poorly trained employee could be one of the biggest risk imaginable.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays