Ashley Madison Hacking: The Dark Web Gets Even Darker




Case Details Case Introduction 1 Case Introduction 2 Case Excerpts

Abstract

This case deals with the data hack issue involving the Ashley Madison website and emphasizes the importance of a secure management information and data security system for an organization. Ashley Madison, an infidelity website owned by Avid Living Media, was hacked by a group calling itself the Impact Team in July 2015. Impact stole the customer information profiles along with the sexual preferences and personal data of the users and threatened to shut down ALM’s network of cheating websites. They also threatened to publish the hacked data online if ALM did not shut down those websites. ALM did not take any step toward closure of the websites but assured its customers that their data was safe. Eventually, Impact put the data on different search engines like trustify.com. This created panic among the customers of Ashley Madison as they feared that exposure of their information online would destroy their existing relationships and their reputation...

IT and Systems Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies
or
IT and Systems Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies
or
PayPal (11 USD)

Issues

The case is structured to achieve the following teaching objectives:

  • Understand the issues and challenges involved in maintaining a secure management information system.
  • Analyze how Avid Life Media can cope with the data breach issue.
  • Explore ways to establish a network of reliable and safe online transactions.
Contents
INTRODUCTION
BACKGROUND NOTE
ASHLEY MADISON’S BUSINESS MODEL
BIG BLOW FROM THE IMPACT TEAM
DATA LEAK BY IMPACT
JITTERY SUBSCRIBERS
BOGUS FEMALE PROFILES
THE HACK AFTERMATH
ASHLEY MADISON WAS NOT THE FIRST…
THE ROAD AHEAD
EXHIBITS

Keywords

Security and control in information system; Data security system; Secure management information system; Data Breach; Hacking; Cyber risk assessments; Ethics; Crisis management;

Introduction - Next Page>>