Preview

Ethics Case Analysis

Powerful Essays
Open Document
Open Document
1127 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics Case Analysis
BINS 7350-01
Information Systems Management
Ethics Case Analysis – Spring 2015
Due: March 30, 2015 at 6:00 p.m.
(Total Points: 50)
Read the following case description of an IT crisis and answer the questions posed at the end of the description.

A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.

IVK Corporation experienced a sudden shutdown of the customer relationship management (CRM) enterprise information system. The information system shutdown was caused by extensive traffic entering IVK’s network of CRM servers from many locations—an organized attack designed to prevent IVK’s security systems from identifying the attempted intrusion into its corporate network. As a result of the attack, the CRM system will not reboot; customer records cannot be accessed; the CRM system is jammed.
Immediately after the attack, top management asks if these symptoms mean that an actual intrusion into its customer database has occurred; has someone exploited a security hole in the CRM system? Is the customer database corrupted? Have customer records been compromised?
Comments made by various members of the management team included the following:
“There’s danger in overreacting as well as underreacting.”
“John thinks it’s malicious.”
“The attack is under control and the CRM system is backed up.”
“Is there any way to tell if bad guys were involved?”
“It depends on how careful they were, if they were there at all. We’re checking on that.”
“No smoking gun yet.” “If it’s bad guys, they’re very, very good.”
“If it was intruders, they had been deep enough into IVK’s CRM production servers to rename database files, which meant they could have also stolen customer data or corrupted it subtly. Unfortunately, the company’s CRM database does retain Social Security numbers and other

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    At approximately 4:30 a.m. on January 12, 2009, iPremier’s website suffered a Distributed Denial of Service (DDoS) attack. A DDoS attack is a method used by mischievous hackers to force a computer resource to stop responding to legitimate users. The hacker achieves this by taking control of a fleet of remote computers, often referred to as “zombies”, in order to send a flood of network traffic to a specific target, in this case, iPremier’s website. The website quickly becomes so overwhelmed dealing with the attacker’s traffic that it essentially locks up, preventing users from accessing the site. (1) After discussing the attack with Bob Turley, CIO, and the IT department, it’s apparent that the website was not prepared for such an attack, as users couldn’t enter the website for approximately one hour and sixteen minutes. Management of iPremier must adjust the company’s IT protocol if the company is to prevent further cyber attacks. In order to accomplish a more secure data system, we suggest management hire a well-known IT specialist to evaluate the situation and give professional advice on how to implement a strong defense. We also advise management to dissolve iPremier’s relationship with Qdata and establish a search team to find a new top notch IT service provider.…

    • 821 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Anthem Syndrome

    • 340 Words
    • 2 Pages

    In 2015, Anthem has announced their biggest data breach yet, 80 million people were at risk in having their personal data exposed which may cause identity fraud. This was not the case in just losing a credit card it was much more personal because of the information it contained. Everyone’s social security numbers, previous health records, previous employees and previous address that is the biggest issue in this case. This was called “sophisticated attack” because someone has impersonated as administrator worker. This allows the thieves to go back in later and enter much sensitive information that is not for the public eye.…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Incidents

    • 2032 Words
    • 9 Pages

    In this document, the importance of security incidents is expressed as a high priority for any business that may possess valuable information. Computer networks are attacked more now than they have before, and in large numbers. There is a high demand for security within Information Technology to ensure that businesses, as well as their clients, do not fall victims to attacks that may compromise their assets. The categories of incidents explain the levels of risk according to the type of incident, as well as what classifies the incident levels. Security incidents are a major part of today’s world, and this document states the issues concerning the rise of e-commerce and products, such as software, that require access to the internet. Concluding the document is a brief example on how to identify and how to prevent a security incident by informing the reader what to look for as a potential threat and how to minimize vulnerabilities within a network.…

    • 2032 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ethics Case Analysis

    • 1712 Words
    • 7 Pages

    This case presents a very typical situation that people encounter while working in the corporate environment. What is ethical, what is morally correct and what is just right out against the law are the questions that we all face while working in a corporate environment. Some of the ethical questions are governed by the law facing the situation. For example while working in an investment bank you most probably have access to inside information about upcoming deals that one could possibly use for personal monetary gain or you could act as a tippie and possibly share that confidential information with others. This kind of a situation is definilety governed by the law and you can actually be charged with various insider trading laws and possibly do some jail time as well. The other situation that is presented in the case is purely about ones ethical and moral standards. The analyst either has to compromise her loyalty towards her company B&B or towards her best friend Lori. While the situation presented is not a real zero-sum game, i.e., one player’s loss does not equal to the gain of the other player. When faced in a situation like this one has to think about what decisions can be made that will have the least affect on the players involved. The analyst should not look at the situation she faces as black or white. She should rather think about other options she might have to retain her friend’s loyalty while not compromising her loyalty towards her current employer. For example, Lori has already been laid off by her current employer, Universal group. The Universal group has already broken certain ethical and moral laws by not informing about the situation to B&B. So can the analyst come up with a situation where she can get Lori immediately and legally hired at B&B and convince her to share the information with B&B. In essence Lori will not have to feel guilty about not keeping the information confidential as has been laid off and the…

    • 1712 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Ipremier Attack Essay

    • 503 Words
    • 3 Pages

    The iPremier Company CEO, Jack Samuelson, had already expressed to Bob Turley his concern that the company might eventually suffer from a “deficit in operating procedures.” Were the company’s operating procedures deficient in responding to this attack? What additional procedures might have been in place to better handle the attack?…

    • 503 Words
    • 3 Pages
    Good Essays
  • Good Essays

    JetBlue Crisis

    • 1651 Words
    • 7 Pages

    On Valentine’s Day 2007, JetBlue decided to follow its airline policy to ensure most flights are completed and opted out to canceling flights in hopes the weather would past fast. Instead, the weather got worse, while many were stranded on flights for hours. JetBlue should have just done a massive cancelation of flights for the day rather than a case by case basis when it was too late. To determine the causes of the failure of JetBlue’s CRM system during the crisis on Valentine’s Day 2007, we first have to evaluate JetBlue’s operating system independently before the crisis took place.…

    • 1651 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Bartholomew, D. (2007). A BANKER 'S $500,000 LESSON IN CRM. Baseline, (69), 68. Retrieved July 17, 2011 from EBSCOhost.…

    • 941 Words
    • 3 Pages
    Better Essays