Discuss about the Case Study Of Online Retail Business Development Plan For A Retail Outlet.
The following report is based on the case study of online retail business development plan for a retail outlet by an independent man. The deployment of the online ordering system would allow the person for the implication of the effective operation development. The contingency planning, security tools, information security act, and security management policy is developed for forming the effective implication of the online operations.
The contingency planning is a tool that implies the use of the surrogate planning for dealing with the implication of the activities for forming the alignment of the improved functions [4]. The implication of the activities would allow the online function implementation of the project plan. The analysis would also be helpful for forming the alignment of the operations of online functional development. The contingency planning for online ordering system would be developed for forming the utilization of the effective operation development and alignment of the improved section development. The implication of the contingency planning would be based on the formation of the activities. The plan development for the probable failure of the project would require the implication of the successive technology innovation [2]. The contingency planning for the project of online ordering system for the retail outlet would involve the following activities,
Delegation before crisis: The occurrence of the catastrophic events would strike all the elements of the project. The issues might lead to the probability of the crisis for the continuation of the project. There are three ways for implementing the delegation in the project of online ordering system development for the independent men’s wear retail outlet and they are hiring an employee for managing the situation, hiring a local contractor for the problem, and bringing the virtual assistant for project operations.
Access to critical info: The contingency plan development would require the inclusion of the access to the most critical information and data [1]. The implication of the critical information and data would allow the implication of the improved functional development. The access to the critical information would help in listing the critical information and accessing important accounts for developing the complete and accurate final contingency planning. It is important for allowing the inclusion of the most critical information to be included in the project of development of the operations.
Development of Procedure Manual: The development of the procedure manual for the implementation of online ordering system would be based on the implication of the successive implication of the effective operation development [3]. The project manager would develop a procedure manual that would consist of the implication of the activities favouring the analysis of the operations. The implication of the activities had also been resulting with the help of the procedure for forming the online system development.
There are multiple security options available for the implementation of the security in the online ordering system development for the men’s apparel retail outlet. The development of the successive activities favouring the implication of the online ordering system would make the data and information accessible on internet cloud platform. It has given rise to a number of security issues and implication of the technological errors for the users. The security tools like BitLocker, NMap, and Paros [7]. The use of these three tools would help in forming the alignment of the security functions for the online ordering system for the retail outlet. The explanation of the security tools is given below,
BitLocker: The BitLocker works as a protection guard for the online data and information storage. The bitlocker comes with a full disk encryption for the information posted on the cloud based internet storage. The BitLocker is available in all latest upgrades of windows (Windows Vista and higher) and it applies protection on a full scale volume of data for keeping the information safe [8]. The BitLocker uses AES encryption process and the algorithm is also similar. The locking method is based on 256 bit or 128 bit keys along with either XTS model or Cipher Block Chaining [6]. The implication of the Cipher Block Chaining can be done on an individual sector of the dataset instead of the whole volume at once. The implication of the technology would help in limiting the understanding of the data by any external person. It comes with the default Windows (Windows Vista or higher), hence, the implication of the BitLocker would be cost effective for the project.
Nmap: The Nmap works as a security scanning and vulnerability analysis tool and it helps in forming an overview analysis of the security functions. The implication of the improved operations would support the deployment of the auditing of the information and network. The Nmap works as the best encryption VPN tool for protecting the data and information [5]. It would allow the safeguard of the data from being misused or being fallen into wrong hand. The Nmap works as an open source port scanner. Since the tool is an open source software, it is available free of cost for the users. Hence, it can be implied for the project of online ordering system development for the men’s apparel retail outlet without using any extra costs. The tool would help in pointing out whether the system is being spied via internet cloud access by monitoring the open services and ports of the network.
Paros: Paros is the most effective penetration testing tool that would be able to analyse the web applications based on the Java based web proxy [9]. It can scanner the complete web site by using the web traffic recorder, hash calculator, and web spider. The tool is most helpful for the analysis of the vulnerabilities like cross site scripting and SQL injections and compare to it functions, the cost of the tool is negligible.
The implication of the web based operations for the project of online ordering system development for the men’s apparel retail outlet would require the organization to abide by the Australian Laws of Privacy and Cyber Security. The ISO 27002 (ISO, 2015) would act as the major standard for the development of the cyber security in the organization [11]. The deployment of the Australian Privacy Principles (APP) would be helpful for aligning the development of the improved cyber security for the online ordering system. The new APPs are a portion of the amendments of the 1988’s Privacy Act (Cth) and it has helped in overcoming the problems for the complexity and confusion for the application of the security [10]. The key points of the information security act of Privacy Act 1988 (Cth) are,
The personal information is identified as the data or information recorded for the individual who can be indentified reasonably. The sensitive information is basically the information like health records, religious beliefs, sexual orientation, biometric information, racial information, and genetic information.
Policy Name: Protective Security Policy Framework
Policy Statement: “The Protective Security Policy Framework (PSPF) applies to non-corporate Commonwealth entities subject to Public Governance, Performance and Accountability Act 2013 (PGPA Act) to the extent consistent with legislation”[10]
Purpose/Objectives: The security management policy is developed for the alignment of the effective security measures and listing the alignment of the successive integration of the operations favouring the alignment of the security measures for the cyber crimes and security issues. The implication of the protective security policy framework would be aligned with the implication of the successive development of the operations. The alignment of the security development had been helpful for the development of the successive implication of the methods for protecting the data for the analysis of the operations.
Scope: The scope of the protective security policy framework is aligned with the implication of the security measures for the online ordering system for the men’s apparel retail store. It would allow the safeguard of the data from being misused or being fallen into wrong hand and can be implied for the project of online ordering system development for the men’s apparel retail outlet to help in pointing out whether the system is being spied via internet cloud access by monitoring the open services and ports of the network.
Standards: The standards of the protective security policy framework are,
Procedures: The procedures of the protective security policy framework are,
Guidelines: The guidelines of the protective security policy framework are,
References
K. Van Assche, M. Duineveld and R. Beunen, “Power and Contingency in Planning”, Environment and Planning A, vol. 46, no. 10, pp. 2385-2400, 2014.
C. Moturi, “Embracing Contingency Planning for University Information Resources”, British Journal of Applied Science & Technology, vol. 4, no. 3, pp. 492-509, 2014.
O. Yoshida and R. Saijo, “3. Transboundary Environmental Co-operation: B. International / Transboundary Contingency Planning / Emergency Assistance”, Yearbook of International Environmental Law, vol. 24, no. 1, pp. 201-204, 2014.
R. Hager, “Biobanking Operations: Contingency Planning and Disaster Recovery of Research Samples”, BioProcessing Journal, vol. 13, no. 1, pp. 56-58, 2014.
B. Horowitz and D. Lucero, “SYSTEM-AWARE CYBER SECURITY: A SYSTEMS ENGINEERING APPROACH FOR ENHANCING CYBER SECURITY“, INSIGHT, vol. 19, no. 2, pp. 39-42, 2016.
W. Wilkinson, “Cyber discovery in investigations”, Network Security, vol. 2016, no. 1, pp. 15-17, 2016.
M. Wagner, “The hard truth about hardware in cyber-security: it’s more important”, Network Security, vol. 2016, no. 12, pp. 16-19, 2016.
M. Hall, “Why people are key to cyber-security”, Network Security, vol. 2016, no. 6, pp. 9-10, 2016.
Y. Storch Rudall, “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners”, Kybernetes, vol. 41, no. 34, 2012.
“IEEE Cyber Security”, IEEE Pervasive Computing, vol. 15, no. 3, pp. c2-c2, 2016.
F. Smith and G. Ingram, “Organising cyber security in Australia and beyond”, Australian Journal of International Affairs, vol. 71, no. 6, pp. 642-660, 2017.
K. Renaud and S. Flowerday, “Human-centred cyber security“, Journal of Information Security and Applications, vol. 34, p. 1, 2017.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download