Cybersecurity Business Proposal: Ethical, Legal Aspects & Kaboosh
VerifiedAdded on 2023/06/10
|18
|4538
|174
Project
AI Summary
This document presents a cybersecurity business proposal for Kaboosh Tech, a cybersecurity firm in Mountain View, California. The proposal outlines the company's vision, mission, and services, including programming, cryptography, training, and consultancy. It addresses the increasing threat of cybercrime and emphasizes the importance of proactive cybersecurity measures. The proposal details a two-stage approach: first, assessing the existing technology infrastructure, and second, implementing security measures and a recovery plan. Key strategies include using strong passwords, antivirus software, and a business continuity plan. The market analysis highlights the growing need for cybersecurity in sectors like healthcare. The proposal also covers target market, pricing strategy, and project schedule, ultimately aiming to establish Kaboosh Tech as a leading cybersecurity provider. The document emphasizes the necessity of identifying and mitigating potential risks, both internal and external, to safeguard sensitive information.

Running head: LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
Legal and Ethical Issues in Cybersecurity
[Name of the Student]
[Name of the University]
[Author note]
Legal and Ethical Issues in Cybersecurity
[Name of the Student]
[Name of the University]
[Author note]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
Table of Contents
Introduction: Company description:................................................................................................2
Business Plan:..................................................................................................................................2
Vision and Mission statement of the Organization:....................................................................3
Market analysis:...........................................................................................................................6
Use of Strong Passwords:........................................................................................................6
Use of Antivirus:......................................................................................................................7
Business Continuity and Recovery Plan for cyber-attacks:.....................................................8
Target market of the organization:..............................................................................................8
Pricing Strategy:........................................................................................................................10
Project Schedule:...........................................................................................................................12
Conclusion:....................................................................................................................................13
References:....................................................................................................................................15
Table of Contents
Introduction: Company description:................................................................................................2
Business Plan:..................................................................................................................................2
Vision and Mission statement of the Organization:....................................................................3
Market analysis:...........................................................................................................................6
Use of Strong Passwords:........................................................................................................6
Use of Antivirus:......................................................................................................................7
Business Continuity and Recovery Plan for cyber-attacks:.....................................................8
Target market of the organization:..............................................................................................8
Pricing Strategy:........................................................................................................................10
Project Schedule:...........................................................................................................................12
Conclusion:....................................................................................................................................13
References:....................................................................................................................................15

2LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
Introduction: Company description:
One of the Standard and leading cyber security firm Kaboosh Tech is situated in
Mountain View, California. They are having the business to design the cyber security solution
for different clients that includes domestic as well as corporate (Rabai et al. 2013). Along with
this they are also associated with providing of consultancy training as well as technical support
to various clients. Their main vision includes the ensuring of the fact that they remain in the top
five cyber security firm. Some of the major components of the cybersecurity include the
following: Application security, Network security, Information security, Operational security,
End-user education and lastly Disaster recovery or business continuity planning. The major
problematic element that is included in the cyber-security is the constant evaluation of the
various security risks (Orji et al. 2012). The traditional approach has been associated with
focusing upon the resources related to the system components which are crucial. This is also
associated with providing protection against the threats which are well known but this initially
leaves the components undefended in front of the less dangerous threats.
Business Plan:
Product and services provided:
They are associated with the providing the customers with a forward thinking that cyber security
features are associated with enabling of the customers to remain a step ahead in whatever
industry they belong to. Some of the major services provided by them includes the following:
Programming
Cryptography
Introduction: Company description:
One of the Standard and leading cyber security firm Kaboosh Tech is situated in
Mountain View, California. They are having the business to design the cyber security solution
for different clients that includes domestic as well as corporate (Rabai et al. 2013). Along with
this they are also associated with providing of consultancy training as well as technical support
to various clients. Their main vision includes the ensuring of the fact that they remain in the top
five cyber security firm. Some of the major components of the cybersecurity include the
following: Application security, Network security, Information security, Operational security,
End-user education and lastly Disaster recovery or business continuity planning. The major
problematic element that is included in the cyber-security is the constant evaluation of the
various security risks (Orji et al. 2012). The traditional approach has been associated with
focusing upon the resources related to the system components which are crucial. This is also
associated with providing protection against the threats which are well known but this initially
leaves the components undefended in front of the less dangerous threats.
Business Plan:
Product and services provided:
They are associated with the providing the customers with a forward thinking that cyber security
features are associated with enabling of the customers to remain a step ahead in whatever
industry they belong to. Some of the major services provided by them includes the following:
Programming
Cryptography
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
Training
Networking
System Hardening
Technical Support
Consultancy and Advisory Services
Functioning of the business is totally impossible without the usage of any kind of
technology. The internet is generally considered to add a great value to the business and is
associated with offering a lot of benefits (Newmeyer 2012). Despite the benefits there exists
several kinds of risks and dangers which are often seen to be very much difficult to understand
and manage the challenges. This business plan would be associated with providing an overview
of the best practices related to cyber-security which are to be adopted by the business (Singer and
Friedman 2014). Cyber-crime is increasing at a rapid rate and is very much realistic in nature.
Along with increasing cybercrime the number of victims is also increasing day by day.
Vision and Mission statement of the Organization:
Their main vision includes the providing of the cyber security services in order to remain
amongst the top five security firm and for the purpose of achieving their vision they are
associated with building of the best business structure. They are associated with putting of plans
and processes in place which would be helping in ensuring the fact that all the things are being
received at the right time from the beginning only. They are consisting of the best management
team who are not only having experience but have also been attuned according to the goals and
objectives of the organization.
Training
Networking
System Hardening
Technical Support
Consultancy and Advisory Services
Functioning of the business is totally impossible without the usage of any kind of
technology. The internet is generally considered to add a great value to the business and is
associated with offering a lot of benefits (Newmeyer 2012). Despite the benefits there exists
several kinds of risks and dangers which are often seen to be very much difficult to understand
and manage the challenges. This business plan would be associated with providing an overview
of the best practices related to cyber-security which are to be adopted by the business (Singer and
Friedman 2014). Cyber-crime is increasing at a rapid rate and is very much realistic in nature.
Along with increasing cybercrime the number of victims is also increasing day by day.
Vision and Mission statement of the Organization:
Their main vision includes the providing of the cyber security services in order to remain
amongst the top five security firm and for the purpose of achieving their vision they are
associated with building of the best business structure. They are associated with putting of plans
and processes in place which would be helping in ensuring the fact that all the things are being
received at the right time from the beginning only. They are consisting of the best management
team who are not only having experience but have also been attuned according to the goals and
objectives of the organization.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
The new business problem can be divided into two sections. In the first stage, the
organization should be associated with discussing the inventory of the technology that is being
used by the business. Some of the key steps for the purpose of having a better security has been
discussed below (Mirkovic and Benzel 2012). In the second stage, a plan is to be made so as to
secure the business and to provide a quick recovery mechanism from any kind of cyber-attack or
data breach. Some of the steps which are to be followed in order to have a better-secured system
have been listed below:
1. Machines which are associated with containing and managing sensitive information like the
payroll and the point of sale should be kept separated from the other machines which are
associated with doing routine services.
2. The domain name of the networked devices which are being used should be set in a proper
way along with the business routers so as to avoid any kind of DNS attacks.
3. It is necessary to change the default username or passwords of the devices to something which
is better than the default one.
4. Strong passwords should be used some of the necessary steps that are to be followed while
setting the passwords have been listed below:
4.1. Same passwords should not be used for the different sites or equipment besides this
passwords are to be used which are generally found in the dictionary.
4.2. The browser should be blocked from saving of the password.
4.3. Considerations should be made regarding the usage of the online password manager.
The new business problem can be divided into two sections. In the first stage, the
organization should be associated with discussing the inventory of the technology that is being
used by the business. Some of the key steps for the purpose of having a better security has been
discussed below (Mirkovic and Benzel 2012). In the second stage, a plan is to be made so as to
secure the business and to provide a quick recovery mechanism from any kind of cyber-attack or
data breach. Some of the steps which are to be followed in order to have a better-secured system
have been listed below:
1. Machines which are associated with containing and managing sensitive information like the
payroll and the point of sale should be kept separated from the other machines which are
associated with doing routine services.
2. The domain name of the networked devices which are being used should be set in a proper
way along with the business routers so as to avoid any kind of DNS attacks.
3. It is necessary to change the default username or passwords of the devices to something which
is better than the default one.
4. Strong passwords should be used some of the necessary steps that are to be followed while
setting the passwords have been listed below:
4.1. Same passwords should not be used for the different sites or equipment besides this
passwords are to be used which are generally found in the dictionary.
4.2. The browser should be blocked from saving of the password.
4.3. Considerations should be made regarding the usage of the online password manager.

5LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
5. Anti-virus software is to be used along with keeping of the operating system and the software
up to date.
6. The software is not to be installed which are not wanted and besides this, all the necessary
software are to be kept updated. The software is to be removed, which are not being used
anymore (McGettrick et al. 2014).
7. Selection of the proper web browser should be used.
8. Selection of proper email client should be done.
9. Before clicking on any of the link received through email it should be made sure that the user
is associated with checking the actual address.
10. while doing any kind of financial or secure transaction it should be made sure that the user is
associated with checking the “https:” which is present in the address bar and also the padlock.
11. In case when there is a need for remote access to the business network then there is a need of
installing a virtual private network on the machines and should be networked in such a way so as
to make them capable of using the HAMACHI VPN which is associated with providing a
encrypted connection to the network of the organization (McGettrick 2013).
12. The pop-up windows should be blocked which are associated with showing unnecessary
messages.
Putting into the use of this changes seems to be a challenging and difficult task but once
put into use can be acting a very useful way of eliminating the risks associated with cybercrimes.
Cyber-security generally acts as something which is much more than a checklist and this won’t
be associated with providing any kind of help whenever the systems are compromised. So it is
5. Anti-virus software is to be used along with keeping of the operating system and the software
up to date.
6. The software is not to be installed which are not wanted and besides this, all the necessary
software are to be kept updated. The software is to be removed, which are not being used
anymore (McGettrick et al. 2014).
7. Selection of the proper web browser should be used.
8. Selection of proper email client should be done.
9. Before clicking on any of the link received through email it should be made sure that the user
is associated with checking the actual address.
10. while doing any kind of financial or secure transaction it should be made sure that the user is
associated with checking the “https:” which is present in the address bar and also the padlock.
11. In case when there is a need for remote access to the business network then there is a need of
installing a virtual private network on the machines and should be networked in such a way so as
to make them capable of using the HAMACHI VPN which is associated with providing a
encrypted connection to the network of the organization (McGettrick 2013).
12. The pop-up windows should be blocked which are associated with showing unnecessary
messages.
Putting into the use of this changes seems to be a challenging and difficult task but once
put into use can be acting a very useful way of eliminating the risks associated with cybercrimes.
Cyber-security generally acts as something which is much more than a checklist and this won’t
be associated with providing any kind of help whenever the systems are compromised. So it is
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
very much important to create a plan which would be appropriate for the business. There is no
such need for making a complex security plan but it should be containing all the necessary
details to cover the current situation of the organization (Trautman 2015). Along with the steps
that are to be discussed above there also exists some of the fundamental steps which are to be
taken that would be acting as the best practice in order to secure the organization from any kind
of cyber-attacks.
Market analysis:
In the healthcare sector it was seen that it was not spared in the year of 2015 where it
was seen that many kind of breaches had occurred resulting in the compromise of more than 80
million record. All this things had started from the year of 2009, where close to one-third of
victims were Americans who suffered from this breaches in several healthcare companies. Due
to this reason many of the healthcare companies put their attention on investing upon cyber
security in order to protect their data from the breaches.
Threats are of two types which are faced by the organization and this mainly includes the inside
and outside threats. Inside threats are usually carried out by a company’s current or former
employee. As per the report by PricewaterhouseCoopers (PwC), states that more than 34% of the
cyber-attacks which had taken place in the year of 2015 were from current employees who were
still working with the firm whereas 28 percent were from former employees. Some of the
preventive measure suggested by the organization includes the following:
Use of Strong Passwords:
This acts as one of the important element which is needed while using the internet on a
daily basis. It is very much necessary to protect each and every account and computers by
very much important to create a plan which would be appropriate for the business. There is no
such need for making a complex security plan but it should be containing all the necessary
details to cover the current situation of the organization (Trautman 2015). Along with the steps
that are to be discussed above there also exists some of the fundamental steps which are to be
taken that would be acting as the best practice in order to secure the organization from any kind
of cyber-attacks.
Market analysis:
In the healthcare sector it was seen that it was not spared in the year of 2015 where it
was seen that many kind of breaches had occurred resulting in the compromise of more than 80
million record. All this things had started from the year of 2009, where close to one-third of
victims were Americans who suffered from this breaches in several healthcare companies. Due
to this reason many of the healthcare companies put their attention on investing upon cyber
security in order to protect their data from the breaches.
Threats are of two types which are faced by the organization and this mainly includes the inside
and outside threats. Inside threats are usually carried out by a company’s current or former
employee. As per the report by PricewaterhouseCoopers (PwC), states that more than 34% of the
cyber-attacks which had taken place in the year of 2015 were from current employees who were
still working with the firm whereas 28 percent were from former employees. Some of the
preventive measure suggested by the organization includes the following:
Use of Strong Passwords:
This acts as one of the important element which is needed while using the internet on a
daily basis. It is very much necessary to protect each and every account and computers by
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
making use of passwords. Some of the necessary steps which are to be followed while providing
passwords have been listed below:
Usage of different type of passwords for different accounts, computers and email
addresses which are generally used by the organization.
Passwords should be changed on a regular basis.
Remembering the passwords by the browser or by the computers should be stopped
manually.
Passwords are not to be stored in the computers.
Passwords should not be provided to anyone who is not authorized to use the systems.
Any kind of unauthorized access would lead to a lot of problems.
Various kind of techniques has been adopted in order to create the passwords. The bigger
the password the better is the password (Kelly 2012). Passwords are to be consisting of
uppercase, lowercase, numbers as well as special characters as well.
Use of Antivirus:
The usage of the antivirus would be very much helpful for the purpose of providing
protection against various kind of risks. There exists nothing which is 100% secure and for that
purpose, an antivirus is to be used. Along with this, the antivirus should be updated on a regular
basis. Besides this, there also exist certain vendors who are associated with charging a fee for the
update and in the case when the user is not capable of affording the update then also the usage of
the antivirus should be continued as this helps a lot in providing protection from the known
vulnerabilities (Kshetri and Murugesan 2013). The antivirus suites generally consists of various
kind of security features which includes the ability of scanning the USBs and CD/DVDs,
firewall, antivirus, antispam, ant phishing, antispyware, ant adware, keylogger detection, browser
making use of passwords. Some of the necessary steps which are to be followed while providing
passwords have been listed below:
Usage of different type of passwords for different accounts, computers and email
addresses which are generally used by the organization.
Passwords should be changed on a regular basis.
Remembering the passwords by the browser or by the computers should be stopped
manually.
Passwords are not to be stored in the computers.
Passwords should not be provided to anyone who is not authorized to use the systems.
Any kind of unauthorized access would lead to a lot of problems.
Various kind of techniques has been adopted in order to create the passwords. The bigger
the password the better is the password (Kelly 2012). Passwords are to be consisting of
uppercase, lowercase, numbers as well as special characters as well.
Use of Antivirus:
The usage of the antivirus would be very much helpful for the purpose of providing
protection against various kind of risks. There exists nothing which is 100% secure and for that
purpose, an antivirus is to be used. Along with this, the antivirus should be updated on a regular
basis. Besides this, there also exist certain vendors who are associated with charging a fee for the
update and in the case when the user is not capable of affording the update then also the usage of
the antivirus should be continued as this helps a lot in providing protection from the known
vulnerabilities (Kshetri and Murugesan 2013). The antivirus suites generally consists of various
kind of security features which includes the ability of scanning the USBs and CD/DVDs,
firewall, antivirus, antispam, ant phishing, antispyware, ant adware, keylogger detection, browser

8LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
hijacker detection, rootkit protection, P2P file sharing protection, automatic updates, custom
scanning modes, and Trojan detection.
Business Continuity and Recovery Plan for cyber-attacks:
There exist several requirements which are necessary in order to run a business. So it is
very much necessary to develop the COOP or the Continuity of Operations and for doing so
Business Impact Analysis is to be done or the BIA. This BIA is associated with reducing the
business to the core functions along with helping the users in identifying the basic structure that
is needed in order to continue the various operations of the business. Checking of the various
functions of the business is checked in order to determine the most critical functions which need
to be continued in order to survive any kind of disaster (Dua and Du 2016). Besides this, the
financial, along with the operational impacts, are also to be considered which includes the order
and the distribution process and many more. Besides this, the identification of the personnel,
resources, equipment, and the systems is needed in order to survive with the essential resources
and also for the purpose of determining the effects in case of any kind of absence of a service.
The potential risks are to be identified as well for the purpose of determining the contingency
plan which is the best for the assets that are affected.
Target market of the organization:
The main reason lying behind the market research was that it would helping the organization in
identifying the things that are expected from the organization by the target market and what are
things that are expect from them. For all this reason the organization is associated with offering
cyber security services to some of the groups of people and businesses which mainly includes the
following:
Government agencies
hijacker detection, rootkit protection, P2P file sharing protection, automatic updates, custom
scanning modes, and Trojan detection.
Business Continuity and Recovery Plan for cyber-attacks:
There exist several requirements which are necessary in order to run a business. So it is
very much necessary to develop the COOP or the Continuity of Operations and for doing so
Business Impact Analysis is to be done or the BIA. This BIA is associated with reducing the
business to the core functions along with helping the users in identifying the basic structure that
is needed in order to continue the various operations of the business. Checking of the various
functions of the business is checked in order to determine the most critical functions which need
to be continued in order to survive any kind of disaster (Dua and Du 2016). Besides this, the
financial, along with the operational impacts, are also to be considered which includes the order
and the distribution process and many more. Besides this, the identification of the personnel,
resources, equipment, and the systems is needed in order to survive with the essential resources
and also for the purpose of determining the effects in case of any kind of absence of a service.
The potential risks are to be identified as well for the purpose of determining the contingency
plan which is the best for the assets that are affected.
Target market of the organization:
The main reason lying behind the market research was that it would helping the organization in
identifying the things that are expected from the organization by the target market and what are
things that are expect from them. For all this reason the organization is associated with offering
cyber security services to some of the groups of people and businesses which mainly includes the
following:
Government agencies
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
Celebrities
Healthcare companies
Educational institutions
Tech Companies
Financial institutions
Small businesses
Political organizations
Military
Marketing and Sales Strategy
Marketing is generally considered to be a critical angle for any business either if it is a new one
or an old one. This is mainly due to the reason that this place is associated with bringing income
for the business along with managing and developing the business. This is also associated with
the creation of awareness amongst both existing as well as new clients for the business. The
significance of promoting has seen organizations keeping a different spending plan and
marketing plans, along with approaches and methodologies that will enable the business to
emerge in the commercial center. Due to this reason the business is conducting a thorough
marketing strategy which would help them to know who their target market is, what it is they
want from the company, and what are the things that the company should expect from them. The
marketing research is also essential because it the organization to know what are strategies that
would be effective in the short and long run and how much the organization would need to set
aside as a marketing budget that will allow them in compete favorably against their competitors.
Celebrities
Healthcare companies
Educational institutions
Tech Companies
Financial institutions
Small businesses
Political organizations
Military
Marketing and Sales Strategy
Marketing is generally considered to be a critical angle for any business either if it is a new one
or an old one. This is mainly due to the reason that this place is associated with bringing income
for the business along with managing and developing the business. This is also associated with
the creation of awareness amongst both existing as well as new clients for the business. The
significance of promoting has seen organizations keeping a different spending plan and
marketing plans, along with approaches and methodologies that will enable the business to
emerge in the commercial center. Due to this reason the business is conducting a thorough
marketing strategy which would help them to know who their target market is, what it is they
want from the company, and what are the things that the company should expect from them. The
marketing research is also essential because it the organization to know what are strategies that
would be effective in the short and long run and how much the organization would need to set
aside as a marketing budget that will allow them in compete favorably against their competitors.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
We also intend to empower our marketing and sales team to ensure that marketing strategies
created for the firm are in line with our core values, goals and philosophies and will seek to
promote our brands at all times. Our marketing team has the right therefore to modify or remove
ineffective strategies that might harm the firm in the long run.
For all this reason the following are the marketing strategies that are to be adopted by Kaboosh
Tech mainly includes:
Providing a formal introduction about the cyber security firm by providing of
introductory letter to healthcare companies, financial institutions, government agencies,
tech companies and other stakeholders in the cyber security market
Putting advertisements in local as well in national newspapers and tech magazines. Along
with all this advertisements are also to be given in the radio and television stations
Engage by negotiating with clients should be done in direct marketing as well in sales
Installing of billboards in strategic locations all around the organization
Using the social media platforms as well as other tech platforms for marketing the
organization vigorously.
Pricing Strategy:
One of the very essential factor for success is the Determination of the right price for the
products and services that are being provided and for this organization it is dependent on lot of
factors that includes the way “how strong the products are, what category of products and
services the customers will be demanding, how unique are the products, what the competitors are
offering and what are the overhead and running expenses should be”.
We also intend to empower our marketing and sales team to ensure that marketing strategies
created for the firm are in line with our core values, goals and philosophies and will seek to
promote our brands at all times. Our marketing team has the right therefore to modify or remove
ineffective strategies that might harm the firm in the long run.
For all this reason the following are the marketing strategies that are to be adopted by Kaboosh
Tech mainly includes:
Providing a formal introduction about the cyber security firm by providing of
introductory letter to healthcare companies, financial institutions, government agencies,
tech companies and other stakeholders in the cyber security market
Putting advertisements in local as well in national newspapers and tech magazines. Along
with all this advertisements are also to be given in the radio and television stations
Engage by negotiating with clients should be done in direct marketing as well in sales
Installing of billboards in strategic locations all around the organization
Using the social media platforms as well as other tech platforms for marketing the
organization vigorously.
Pricing Strategy:
One of the very essential factor for success is the Determination of the right price for the
products and services that are being provided and for this organization it is dependent on lot of
factors that includes the way “how strong the products are, what category of products and
services the customers will be demanding, how unique are the products, what the competitors are
offering and what are the overhead and running expenses should be”.

11LEGAL AND ETHICAL ISSUES IN CYBERSECURITY
Depending on the competitive market, the organization should intend to offer discounted price
on few of the products along with providing discounts on few other incentives for the first three
months of operation. This would be done in order increase the awareness about the product and
also to attract more customers.
So the major areas where the start-up capital should be spent includes the following:
Total fee in order to get Kaboosh Tech registered in the United States of America – $750
Obtaining of the necessary licenses, permits, accounting and customer software as well as
other legal expenses – $2,250
Insurance policy – $2,000
Leasing of a facility for use for at least five years and carrying out renovations
– $100,000
Cost required for hiring a business consultant – $2,000
first 3 months Operational cost– $150,000
Other start-up expenses – $15,000
expenses for Marketing promotion– $5,000
expenses related to Administration– $30,000
Cost of purchasing an official fairly used van – $20,000
Cost of launching a website – $1,000
Cost of throwing a grand opening party – $5,000
Depending on the competitive market, the organization should intend to offer discounted price
on few of the products along with providing discounts on few other incentives for the first three
months of operation. This would be done in order increase the awareness about the product and
also to attract more customers.
So the major areas where the start-up capital should be spent includes the following:
Total fee in order to get Kaboosh Tech registered in the United States of America – $750
Obtaining of the necessary licenses, permits, accounting and customer software as well as
other legal expenses – $2,250
Insurance policy – $2,000
Leasing of a facility for use for at least five years and carrying out renovations
– $100,000
Cost required for hiring a business consultant – $2,000
first 3 months Operational cost– $150,000
Other start-up expenses – $15,000
expenses for Marketing promotion– $5,000
expenses related to Administration– $30,000
Cost of purchasing an official fairly used van – $20,000
Cost of launching a website – $1,000
Cost of throwing a grand opening party – $5,000
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 18
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.