Corporate Risk Profile Part 1: Buyer Profile

Anonymous
timer Asked: Jul 1st, 2018
account_balance_wallet $55

Corporate Risk Profile Part 1: Buyer Profile For this paper, you will research and construct a corporate risk profile for a publicly-traded company which operates in cyberspace and therefore has a need for cybersecurity products and services. A list of approved companies appears at the end of this file (see Table 1). If you wish to use a company not on the approved list you must first obtain the approval of your instructor. Research Your Chosen Company 1. Review the company’s website to learn about the products and services which it sells. 2. Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile. Use this URL to access the database http://ezproxy.umuc.edu/login?url=http://www.mergentonline.com/Hoovers 3. The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the “Print Quick Report” menu item under My Tools (in the Hoovers report pages). 4. Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc. 5. Using the information obtained from your sources, identify the types of information and business operations which drive this company’s need for cybersecurity products and services. (What needs to be protected?) 6. Using the course readings and other materials, develop a “Buying Forecast” for likely purchases by this company for cybersecurity related products and services. Analyze the Company’s Risk Statements 1. Using the links from Table 1 (at the end of this file), download a copy of your selected company’s most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.) 2. Read and analyze the Risk Factors section in the company’s report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information. 1. Analyze the risk factors to determine which ones are related to Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list for yourself that shows what information and/or business operations need to be protected from cyberattacks and/or cybercrime (including insiders and external threats). 3. Next, using what you learned in CSIA 310 and other courses, identify cybersecurity related products and services which the company could use or deploy as countermeasures or safeguards to protect its information, information systems, and information infrastructures. Make sure that you address each item listed in your analysis for item #2. This information will become part of your “Buying Forecast” (see the “Write” section below). Write 1. An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history. 2. An overview of the company’s operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. 3. A separate section in which you describe this company’s needs or requirements for cybersecurity. What information and/or business operations need to be protected? What are the likely sources of threats or attacks for each type of information or business operation? (e.g. Protect customer information from disclosure or theft during online purchase transactions.) 4. A separate “Buying Forecast” section in which you discuss the company’s likely future purchases for cybersecurity products and services. In this section, you should identify and discuss three or more categories of cybersecurity products or services which this company is likely to purchase. Additional Information 1. Your three to five page Corporate Risk Profile Part 1: Buyer Profile should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx. 3. 5. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources. 6. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. See CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx file under Content > Course Resources.) 7. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 8. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 9. Consult the grading rubric for specific content and formatting requirements for this assignment. See Table 1 on the next page for the list of companies. Table 1. List of Approved Companies for Corporate Profile Project Company Name Alphabet, Inc (Google) Amazon Apple Booking Holdings Facebook Microsoft Oracle Corp. PayPal Holdings Salesforce Corporate Website / Investor Relations Form 10-K from SEC Edgar Database https://www.google.com/intl/en/about/company/ https://investor.google.com/ https://www.sec.gov/Archives/edgar/data/1652044/000165 204418000007/goog10-kq42017.htm http://www.amazon.com http://phx.corporateir.net/phoenix.zhtml?c=97664&p=irol-irhome http://www.apple.com/about/ http://investor.apple.com/ https://www.bookingholdings.com/ http://ir.bookingholdings.com/investor-relations https://www.facebook.com/facebook http://investor.fb.com/ http://www.microsoft.com http://www.microsoft.com/investor/default.aspx http://www.oracle.com/us/corporate/index.html http://investor.oracle.com/overview/highlights/default.aspx https://www.paypal.com/us/webapps/mpp/about https://investor.paypal-corp.com/ https://www.salesforce.com/company/ http://investor.salesforce.com/aboutus/investor/overview/default.aspx https://www.sec.gov/Archives/edgar/data/1018724/000101 872418000005/amzn-20171231x10k.htm https://www.sec.gov/Archives/edgar/data/320193/0000320 19317000070/a10-k20179302017.htm https://www.sec.gov/Archives/edgar/data/1075531/000107 553118000015/pcln-20171231_10k.htm https://www.sec.gov/Archives/edgar/data/1326801/000132 680118000009/fb-12312017x10k.htm https://www.sec.gov/Archives/edgar/data/789019/0001564 59017014900/msft-10k_20170630.htm https://www.sec.gov/Archives/edgar/data/1341439/000119 312517214833/d385998d10k.htm https://www.sec.gov/Archives/edgar/data/1633917/000163 391718000029/pypl201710-k.htm https://www.sec.gov/Archives/edgar/data/1108524/000110 852417000006/crm-2017131x10k.htm

Tutor Answer

ProfessorEmily
School: University of Maryland

Attached.

Running head: CORPORATE RISK PROFILE

1

Corporate Risk Profile
Name:
Institution:
Instructor:
Course:
Date:

CORPORATE RISK PROFILE

2
Introduction

Facebook is a social media platform that has taken the world by storm by connecting its
users all over the globe. The founders of Facebook are Mark Zuckerberg with his college roommate
Chris Hughes, Dustin Moskovitz, Andrew McCollum, and Eduardo Saverin at Harvard University
(Brügger, 2015). Initially, it was known as Facemash as it was set up as a type of game for students
in Harvard University. Eligible members were only students from Harvard University, and within
a month, nearly half of the population in the institution had registered. In March 2004, Facebook
was expanded to Yale, Columbia, and Stanford Universities where it grew until it was accessible
to Boston area schools and Ivy League (Brügger, 2015). Ultimately, most universities in the U.S.
and Canada adopted its use in connecting people. In the summer of 2004, Facebook was
incorporated, and Zuckerberg became the president. In the same year June, it was headquartered
in Palo Alto, California where it procured the domain name facebook.com for the US $ 200,000
(Brügger, 2015).
Company Operations
Facebook is a social networking service and social media company headquartered in Menlo
Park, California. Its website is owned and operated by Facebook, Inc. having been founded in 2004
(Brügger, 2015). The executives of Facebook include Mark Zuckerberg as the chairman and CEO,
David Wehner as the Chief Financial Officer, Sheryl Sandberg as the Chief Operating Officer,
Chris Cox as the Chief Product Officer, and Mike Schroepfer as the Chief Technology Officer
(Brügger, 2015). In 2017, the company had 20, 658 employees. The basics of this company’s
business remain similar where a user creates content in the form of links, photos updates,
comments. and likes then it sells advertisement targeted to the content developed or the person.

CORPORATE RISK PROFILE

3

The major reve...

flag Report DMCA
Review

Anonymous
Outstanding Job!!!!

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors