IKEA are facing cybercrimes threat by some kinds of people that master in all kinds of illegal activities using Internet. For example, a hacker is an outsider that gets in the computer system; get the information about the company and what is going on in the company, usually without criminal purposes or ideas. Another type of hacker is call cracker. A cracker is someone that wishes to break into the computer system for malicious purposes. Sometimes some computer criminals or collective spies will get around the security systems in the company through building an inappropriate relationship with the insiders. This is knows as social engineering.
IKEA deals with the cybercrimes using security mechanisms. Security mechanisms are the method, procedure or tool to apply the rules stated in the security policy. The solution to deal with cybercrimes is through physical access security. Physical security can prevent attackers from accessing the computer system such as servers, routers and switchers and always keep them in a locked, fire protected environment and climate controlled.
The second intentional threat is market forces. Nowadays, there are many other companies entering the low price household and furnishing the markets. Although the products quality is not as good as IKEA, it will still affect the company. To overcome this problem, IKEA can use the economies of scale because lower average cost in the long run through such as using better technology or hire specialized managers. Also, economies of scale can give a business a competitive progress if cost savings then passed on to customers in the form of lower prices. This will puts up high barriers to entry for smaller companies that try to enter the market.
Unintentional threats are defined as a man-made incident that enabled or caused by human beings without malicious purposes. The most common type of unintentional threat is human error. In IKEA, human errors can happen in the design of hardware and information system. Also, human error can occur in testing, date entry, data collection, programming, authorization and procedures. For example, if a worker in IKEA accidentally input the wrong information