StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Systems Management and Security for Wal-Mart Business - Coursework Example

Cite this document
Summary
The paper "Systems Management and Security for Wal-Mart Business" states that in the current age of information technology there are lots of issues regarding information security and privacy. These issues become more critical when we talk about business and economical data…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Systems Management and Security for Wal-Mart Business
Read Text Preview

Extract of sample "Systems Management and Security for Wal-Mart Business"

?SYSTEMS MANAGEMENT AND SECURITY FOR WAL-MART BUSINESS Systems Management and Security for Wal-Mart Business Affiliation TABLE OF CONTEST INTRODUCTION 3 WAL-MART: BUSINESS OVERVIEW 4 INFORMATION SECURITY: BASIC NEED 6 WAL-MART INFORMATION SECURITY POLICY 8 INFORMATION SECURITY AT WAL-MART 10 Communications Security Solution 10 Data Transfer Security 11 Evaluation and Feedback 12 Audits 12 SUGGESTIONS FOR ORGANIZATIONAL SECURITY IMPROVEMENT 13 VPN (Virtual Private Network) 13 Improved Privacy Policy and IT security Strategy 13 PROBLEMS CAN EMERGE 14 References 15 INTRODUCTION Information security refers to the process of securing secret and important business as well as personal data and information. It secures its confidentiality, accessibility and reliability. The role of information security for allowing access to the stored data and information on computer databases has augmented significantly over the past few decades. Additionally, a lot of businesses now store more and more customers and business data on computer systems that was not seen formerly. In this scenario, most of the data stored is extremely secret and not intended for common people screening in addition to the outside business access. In addition, a lot of companies are exclusively dependent on their business and economical data which is proficiently stored in computers like any web based enterprise. In case of such businesses we can have customer records, private employee’s information, employee’s salary details, advertising and sales data and bank account information stored on electronic database systems. In this scenario, without this business and economical data, it would frequently be extremely difficult for a company to work effectively. For this reason new and more enhanced technology based structures and security systems are implemented to protect such kinds of sensitive business data and information which can later on be used for effective decision making. However, better business information security systems include a variety of processes, expertise, safety products and measures. In addition, the software applications that offer virus protection scanners and firewall information safety are not sufficient on behalf of their performance to defend huge and extensive information stores. Thus, a group of systems and practices are required to be implemented to successfully discourage illegal entry and interpretation to information systems and databases (Crystal, 2011), (Anderson & Schneier, 2008) and (Grimaila, 2004). Information security is becoming extremely important for all the businesses. This report presents a comprehensive analysis of one of the biggest global business Wal-Mart. This report will analyze some of the prime IT security procedures that Wal-Mart organization currently uses. This report will also outline that how these security procedures are used and what threats they are designed to combat. Wal-Mart is one of the biggest worldwide retailers. It is one of biggest financial power, a glowing ruler for argument and an intellectual experience. In addition, the Wal-Mart is the mind-piece of Sam Walton, who is having a personal thinking to offer customer lesser prices than they get somewhere. That fundamental policy has made the Wal-Mart's culture and presently formulated as a biggest business monster. At present Wal-Mart business setup is exceptionally massive. Moreover, it has amazing power to create employment marketplaces worldwide as well as transform the method all companies generally do their jobs (Wilbert, 2011), (Walmart, 2011) and (William F. Achtmeyer Center for Global Leadership, 2002). WAL-MART: BUSINESS OVERVIEW Wal-Mart business setup was established in 1962 by the Sam Walton, with a first Wal-Mart store that was started at Rogers, Arkansas. This business attained annual sales of $1 billion after 17 years of its development. At the end of January 2002, Wal-Mart business Stores, Inc. turned out to be a world’s biggest seller, along with $218 billion of annual sales. Additionally, the successful business policy of Wal-Mart in United States was established upon selling well-known products and goods at extremely low price as compared to other businesses. Every week, approximately 100-million business customers or clients come for shopping at Wal-Mart retail store all through the globe. In addition, the business engaged over 1.3-million staff members globally in the course of over 3,200 retails business stores in the US plus above 1100 working business stores in Puerto Rico, Mexico, Argentina, Canada, China, Brazil, UK, Korea as well as in Germany. Furthermore, in 2001, world’s well known publication Fortune has elected Wal-Mart as the 3rd most well-liked business in US, and other publications like that Price-water-house-Coopers and the Financial-Times graded Wal-Mart as the 8th biggest well-liked business across the globe. The Wal-Mart business possessed a convoy of over 12,000 trailers and 3000 trucks. In addition, the Wal-Mart business had established a satellite network structure that permitted business data and information to be exchanged among all the business’s worldwide communication networks and business stores/centers, dealers and sharing centers. In this scenario, the system combined information for commodities, allowing the business to purchase large volumes of truckload without acquiring the higher inventory expenditures (William F. Achtmeyer Center for Global Leadership, 2002) and (Wilbert, 2011). Figure 1Wal-Mart's slogan, Image source: http://coolcanucks.ca/wp-content/uploads/2010/05/walmart-logo.jpg INFORMATION SECURITY: BASIC NEED In absence of high-quality information confidentiality and safety, a business’s whole working and operational structure could be at huge risk. Consequently it is consumer’s personal data and information security and privacy. Here we have a basic concern, “why information security procedures are necessary by national and federal law, business general logic, organizational documentation, organizations’ necessities and the standards of business moral values with regard to information security. In addition, an information security system is simply as excellent as its most frail connection consequently each element of security is significant in all aspects. Moreover, a lot of policies usually planned may look understandable; however it is frequent to discover infringements of them on a daily basis. In a lot of scenarios security issue could be predetermined through an easy transformation in our manners, or a moderate souvenir to an associate participating in the business procedure (University of Miami Ethics Programs, 2010) and (Turban, Leidner, McLean, & Wetherbe, 2005). To establish business stability we need to increase business investment return and business prospects and reduce business expenditures, it is significant for our information to be protected beside external security based threats and dangers. However, information does not just denote the data stored in computer system. On the other hand, there are several formats of information. It can be in the format of written wording or printed on paper, passed on via post or internet, stored by e-mail, or verbal in diverse discussions. Moreover, in case of information security we are aimed to preserve some of the main information security related aspects like: (BusinessLink, 2010) and (Johnson, 2011) Confidentiality: It is about making sure that data and information is available to the allowed persons. Integrity: It is about protecting the perfection and correctness of information as well as related processing techniques Availability: this factor makes sure that only approved people are able to access business information and concerned resources as needed. Information security outlines that we are in need of being capable to make use of information the moment we require it. It as well offers self-belief that it has not been reorganized and that we have proficiently managed that which users are able to see and utilize particular type of information. There is no particular way-out to successfully implement information security. Moreover, it is not directly about purchasing computer program to enable maximum security of the business (BusinessLink, 2010) and (Johnson, 2011). The effective information security is attained through the establishment of appropriate controls or hold on: Measures Strategies Software tasks Organizational frameworks These controls should be customized to effectively manage and handle our business goals and aims in addition the character of our company (BusinessLink, 2010) and (Johnson, 2011). WAL-MART INFORMATION SECURITY POLICY In order to better manage the information and data of the company Wal-Mart business has established an enhanced business policy and operational framework. This section outlines some of the main security procedures that Wal-Mart business has established in order to protect its organizational information. Wal-Mart business protects customer information at the first business preference. No matter the customers are shopping through web based technology or Wal-Mart physical stores, Wal-Mart makes use of practical security processes to secure the privacy of customer’s personal and sensitive information. As a worldwide corporation, Wal-Mart business has divided privacy strategies for its global workplaces. Customer personal information can be manipulated and stored in the US or other states in which Wal-Mart business or their service suppliers uphold such data processing services. Internationally, Wal-Mart business requires suite of businesses to defend customers’ personal details, irrespective of wherever such kind of data and information is stored, by fulfilling the nationwide laws and Wal-Mart business strategies and practices (Wal-Mart2, 2011). Wal-Mart business outlined that customer account sensitive data and information is secured through the password technology implementation that customer utilizes to access his/her online account for shopping purposes. In addition, the Wal-Mart business suggests its customer to protect this secret password and keep it confidential. Moreover, Wal-Mart also makes use of a security technology acknowledged as SSL (Secure Sockets Layer). Through this technology in the customer’s web browser that is SSL enabled, customer account information will be protected all through transmission during the web utilization. So when we go into the protected section of a business website, that is any page encompassing some secret account data and information, a bold key or an image of a blocked lock should appear in the bottom bar or address bar of our web browser window. If we click on this icon of lock, a tiny popup window will open that will demonstrate the website security information. This security presentation outlines that our personal data as well as secret information is transferred in encrypted format from a customer web browser to Wal-Mart business web server, not to various unknown or illegal servers (Wal-Mart2, 2011). For the enhanced security of information Wal-Mart has also implemented another physical approach for the security of personal information that is sustained in Wal-Mart retails offices or stores is implemented through managerial, physical and technological controls also. Additionally, the hard copies of secret business and sensitive information are managed and uphold in the locked locations or cupboards with related limitations for storing such information electronically. However, in case of theft or discard to such data and information of business in this condition is ruined, frayed, removed or else required to be made indecipherable and non- interpretable form (Wal-Mart2, 2011). INFORMATION SECURITY AT WAL-MART Communications Security Solution Wal-Mart business Stores, Inc, has established an enhanced information security and data communication management system with the help of SSH Communications Security Systems. In this scenario, SSH Communications Security is a Finnish based corporation that is founded by Tatu Ylonen in 1995. Additionally, SSH Communications Security Company is worldwide leading supplier of safe file-transfer and end-to-end communications safety applications systems for the businesses all through the world. In addition, SSH Communications Security solution offers a security protocol for logging into a remote business server. Moreover, the SSH Communications Security system offers an encrypted session for executing server applications as well as transferring files. It as well serves as a protected server/client link intended for applications like that database access and e-mail. Furthermore, Wal-Mart has established SSH Tectia (R) application system to allow protected far-off accessibility and safe uninterrupted information and data file transmission all through the trade dominant worldwide by the Wal-Mart business Stores computing arrangement (TheFreeLibrary, 2010). Wal-Mart business Stores selected SSH Tectia client/server system protects secret business data in transfer, offers authoritative strong encryption techniques, supports mixed computer communications and numerous verification methods, with the additional support of improved SFTP Secure File Transfer Protocol potentials. SSH Tectia offers a perfect option to disallow risky Telnet sessions and file transfers (TheFreeLibrary, 2010) and (Savvas, 2007). Wal-Mart has also chosen SSH-Tectia-Manager, a wide-ranging communications security implementation platform, to competently handle the business-wide SSH-Tectia business information security solution. In this scenario, SSH-Tectia-Manager facilitates powerful consumption, reformation along with maintenance processes on a corporate-wide level; furthermore it has the capability to carry out assessment tasks to help uphold dogmatic agreement in a beneficial way (TheFreeLibrary, 2010) and (Savvas, 2007). With the complication or extent of Wal-Mart business situation, it was significant to discover a method that could make use of all the platforms. In this scenario the central administration of SSH-Tectia-Manager will facilitate Wal-Mart business to rapidly organize, simply uphold and shorten setting management in Wal-Mart business framework. Thus, it is the main way that will offer a better return on investment through this technology implementation (TheFreeLibrary, 2010) and (Savvas, 2007). Data Transfer Security SSH Communications Security based solution SSH-Tectia has offered the Wal-Mart capacity of availing superior solution to implement protected remote access control as well as carry safe back-to-back data file transmission all through business retailer's at the worldwide system. Moreover, this SSH-Tectia client/server solution has offered security to Wal-Mart business by protecting sensitive business data in its transfer and offering powerful encryption methodologies, facility to support different types of business computing technology based platforms as well as numerous verification technologies, beside improved SFTP (Secure File Transfer Protocol) services (Savvas, 2007). Evaluation and Feedback Wal-Mart plans to occasionally evaluate and analyze External Counsel’s and business stores performance. In this scenario, this evaluation will work like a tool to enhance business infrastructure and to offer positive advice to External Counsel. In addition, it can as well help concern of the Company’s yearly basis information security evaluation of External Counsel’s efficacy, competence and multiplicity. Moreover, it will be the responsibility of External Counsel to suggest an action plan describing the useful steps that will be performed to cure some shortcomings known in the overall business communication and operational management areas (Wal-Mart Stores, Inc., 2007). Audits Wal-Mart establishes the privilege to audit these information security and privacy management policies. In addition, these information technology security audits can be done on unexpected or informed basis. Moreover, such security assessment audits can consist of working and operational evaluation or meetings with the External Counsel headquarter where the workers are doing their job (Wal-Mart Stores, Inc., 2007). SUGGESTIONS FOR ORGANIZATIONAL SECURITY IMPROVEMENT This section presents some suggestions that can enhance the overall security set-up of the Wal-Mart business: VPN (Virtual Private Network) For the better protection and safety of the business information at Wal-Mart Corporation there is an awful need for the establishment of VPN (virtual private network). This VPN technology will help protect the business critical data and offer superior security for the business and its overall communication network. In addition, this will offer more authenticated security based log-in system for accessing the business network. In this way only well authenticated business staff will be able to get access to the business system (Forouzan & Fegan, 2006). Improved Privacy Policy and IT security Strategy For the better protection of customer information and effective management of the business financial data there is a vital need for the establishment of the excellent business privacy policy and IT security strategy which could effectively supervise the business information security. In this scenario we need to offer better periodic updates for the business security aspects and areas. PROBLEMS CAN EMERGE In establishing the above given business recommendations a lot of issues can generally emerge regarding the effective business working and operational aspects. One of the main issues that can emerge is in the VPN (Virtual Private Network) establishment at the Wal-Mart business. This will require an additional cost along with budgetary issues in their overall implementation. This can cause technology transformation issues. In this scenario establishment of such innovative changes can influence the whole corporate working and operational performance. On the other hand the constant improvement and enhancements in the privacy policy and IT security strategy can cause some customer related issues. In this regard there can be some customer privacy issues and exasperation for constant changes in the business privacy policies and their overall implementation. CONCLUSION In the current age of information technology there are lots of issues regarding information security and privacy. These issues become more critical when we talk about the business and economical data. This report has discussed various security aspects with respect to Wal-Mart Corporation, which is a huge business set-up that is consisting of world-wide business branches. This massive setup of business can also face various information and privacy related issues. This report has presented a comprehensive analysis of some of the main issues those can emerge in case of Wal-Mart business setting. This report has outlined some of the fundamental aspects regarding IT security platform of Wal-Mart business. This report has also presented some effective suggestions to improve these areas. References Anderson, R., & Schneier, B. (2008). Economics of Information Security. Retrieved March 15, 2011, from Bruce Schneier: http://www.schneier.com/paper-economics.pdf BusinessLink. (2010). Information security best practice. Retrieved March 26, 2011, from http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1075406932&type=RESOURCES Crystal, G. (2011, March 04). What is Information Security? Retrieved March 25, 2011, from WiseGeek.com: http://www.wisegeek.com/what-is-information-security.htm Forouzan, B., & Fegan, S. C. (2006). Data Communications and Networking, 4th edition. New York: McGraw-Hill. Grimaila, M. R. (2004). Maximizing Business Information Security's Educational Value. IEEE Security and Privacy Volume 2, Issue1, 56-60. Johnson, B. C. (2011). Information Security Basics. Retrieved March 24, 2011, from http://maltainfosec.org/archives/208-Information-Security-Basics.html Savvas, A. (2007, August 17). Wal-Mart deploys new data security system. Retrieved March 26, 2011, from ComputerWeekly.com: http://www.computerweekly.com/Articles/2007/08/17/226259/Wal-Mart-deploys-new-data-security-system.htm TheFreeLibrary. (2010, Ausgut 15). Wal-Mart Selects SSH Tectia Solution to Secure Data-in-Transit. Retrieved March 24, 2011, from http://www.thefreelibrary.com/Wal-Mart+Selects+SSH+Tectia+Solution+to+Secure+Data-in-Transit.-a0167607462 Turban, E., Leidner, D., McLean, E., & Wetherbe, J. (2005). Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley. University of Miami Ethics Programs. (2010). INFORMATION SECURITY BASICS. Retrieved March 25, 2011, from http://privacy.med.miami.edu/tutorials/security_basics.pdf Wal-Mart Stores, Inc. (2007, June 01). WalMart Outside Consel Guidelines. Retrieved March 26, 2011, from http://www.acc.com/advocacy/valuechallenge/toolkit/loader.cfm?csModule=security/getfile&pageid=40433&title=Wal-Mart%20Outside%20Counsel%20Guidelines Walmart. (2011). Walmart Discount Stores. Retrieved March 25, 2011, from http://walmartstores.com/aboutus/7606.aspx Wal-Mart2. (2011). Walmart Privacy Policy - Highlights. Retrieved March 24, 2011, from http://walmartstores.com/PrivacySecurity/9243.aspx Wilbert, C. (2011). How Wal-Mart Works. Retrieved March 22, 2011, from HowStuffWorks, Inc. : http://money.howstuffworks.com/wal-mart.htm William F. Achtmeyer Center for Global Leadership. (2002). Wal-Mart Stores, Inc. Retrieved March 22, 2011, from http://mba.tuck.dartmouth.edu/pdf/2002-2-0013.pdf REFERENCES Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT security Coursework Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1412137-it-security
(IT Security Coursework Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/finance-accounting/1412137-it-security.
“IT Security Coursework Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/finance-accounting/1412137-it-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Systems Management and Security for Wal-Mart Business

Business Environment of a Wal-Mart

The paper "business Environment of a Wal-Mart" describes that the external environment composed mainly of general factors pertaining to social, political, legal, economic and other environmental factors counts fulfills the macro-economic environment of the firm.... The business environment of Wal-Mart like any other business firm is divided along with both internal and external facets.... business Environment of a FirmThe business environment of a firm is composed of such factors belonging to the external side of it and would affect the present and future operations of the firm....
9 Pages (2250 words) Essay

Security Management of Wal-Mart

In order for wal-mart to know how these technologies will support the business in obtaining implicit and explicit objectives, it must develop IT governance strategies.... In order for wal-mart to lower its costs, maximize return on capital, and streamline its operations, the company is using the operational excellence strategy.... "Security Management of Wal-Mart" paper identifies the IT services of Wal-Mart and whether these services are aligned to the needs of the business....
9 Pages (2250 words) Essay

Will Wal-Mart Get RFID Right this Time

This essay "Will wal-mart Get RFID Right this Time" sheds some light on the RFID that refers to an electronic system by which consumer products are tracked from the moment they are produced to the time they are carted away from a shop.... wal-mart is one of the retail stores that have deployed RFID technology to avoid queues and other inconveniences of the UPC commonly used in shops.... wal-mart is one of the consumer products outlets that have previously trial to roll out a RFID program to avoid the hustling resulting from queues and other disadvantages of the Universal Product Code....
6 Pages (1500 words) Essay

Aggressive Marketing in the Present World

n any marketing sector marketing plan is considered to be very important and a thoughtful business plan cannot be overemphasizes because much hinges on it: financial support, management of the available resources like operation and finances, credit from suppliers, promotion and marketing and last but not the least company's goals and achievements. ... If the marketers were able to meet this demand of people of the society, definitely there would be a souring business for their product....
5 Pages (1250 words) Case Study

Wal-Mart Effect

In any marketing sector marketing plan is considered to be very important and a thoughtful business plan cannot be overemphasizes because much hinges on it: financial support, management of the available resources like operation and finances, credit from suppliers, promotion and marketing.... wal-mart, Target and Kmart are the top retailers in the present American market.... wal-mart is the king of the ring.... Target is slowly moving closer to wal-mart and has become a tough competitor to wal-mart....
5 Pages (1250 words) Essay

Organizational Change at Wal-Mart

The entrance of new uprising superstars such as Tesco and Target makes it difficult for wal-mart to maintain its market dominance.... It also intends to replace bar codes and security tags with Radio frequency identification (RFID) microchip transponders.... The paper "Organizational Change at wal-mart" highlights that wal-mart has been criticized for self-administration of their own ethical benchmarks.... wal-mart's green retailing initiative should cover broader environmental concerns according to big-box format of retailing....
10 Pages (2500 words) Case Study

Security Management of Wal-Mart

In order for wal-mart to know how these technologies will support the business in obtaining implicit and explicit objectives, it must develop IT governance strategies (Schwalbe, 2009, p.... In order for wal-mart to lower their costs, maximize return on capital.... The main focus of this study is to identify the IT services of Wal-Mart and whether these services are aligned to the needs of the business and the customers.... inda Dillman, the Chief Information Officer (CIO) of Wal-Mart noted that 'We do not want to be known by our technology, but we do want to be known by what our technology has done for the business' (cited in Luftman, 2004, p....
9 Pages (2250 words) Case Study

Global Logistics System of Wall-Mart

It can likewise influence the business sector capacities and the trade rates as it can hamper the movement of goods.... The paper "Global Logistics System of Wall-Mart" examines the global logistics systems, in particular, focusing on the storage systems of wal-mart's retail location by examining the IT store network, logistics administration, supplier connections, and stock administration.... Wall-Mart uses integrated global logistics systems in its supply chains and outsourcing activities....
11 Pages (2750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us