Managing Information Resources: Ensuring Data Security
|
|
ICMR HOME | Case Studies Collection
Case Details:
Case Code : ITSY057
Case Length : 13 Pages
Period : 2002-2007
Pub Date : 2007
Teaching Note :Not Available Organization : -
Industry : Miscellaneous
Countries : Global
To download Managing Information Resources: Ensuring Data Security case study
(Case Code: ITSY057) click on the button below, and select the case from the list of available cases:
Price: For delivery in electronic format: Rs. 300;
For delivery through courier (within India): Rs. 300 + Shipping & Handling Charges extra » IT & Systems Case Studies Collection
» IT and Systems Short Case Studies
» View Detailed Pricing Info » How To Order This Case » Business Case Studies » Case Studies by Area
» Case Studies by Industry
» Case Studies by Company
Please note:
This case study was compiled from published sources, and is intended to be used as a basis for class discussion. It is not intended to illustrate either effective or ineffective handling of a management situation. Nor is it a primary information source.
Chat with us
Please leave your feedback
|
<< Previous
Excerpts
Background Note
In 2004, Gartner, Inc. (Gartner), issued the first warning to organizations about the threats they faced from the portable devices
carried by the employees. The Gartner report, which made the headlines at that time, inspired Usher to come up with the term
'pod slurping' in 2005 in his blog , Sharp-ideas.net. Usher developed a proof of concept piece of software named Slurp.exe,
which ran directly on an iPod, to prove the dangers of modern IT devices and to forewarn the companies of the impending dangers...
The Problem
Data theft, one of the major security issues facing the companies, could lead to
heavy financial and economic loss to the organizations, according to experts.
Apart from the more prevalent forms of data theft like online hacking of the
organization's networks and stealing of hard copies of the files of the
organization, the companies were now waking up to yet another 'physical' way of
data theft with innocent looking IT gadgets like iPods, digital cameras, MP3
players, and smart phones. The expenses incurred on preventing the theft of data
were slowly taking a major part of the IT budget for many organizations...
|
|
Motives for Slurping
Employees could easily use their advantage of access to the internal
resources of the company to steal vital data. An employee could engage in
pod slurping for various reasons, according to experts. The main motives for
stealing the data were: monetary gain, malicious intent, and curiosity.
Corporate data was profitable in many ways; patented formulae, tender
details, plans for future expansion were some bits of information which
could be very useful to competitors and fetch a good sum of money in the
market. Dishonest employees could steal data and sell it to their
competitors...
|
A New HR Dilemma
The possible threats posed by these portable devices were also becoming
a HR dilemma for the organizations. Insider information was the biggest
threat to the safety of the data resources of the organization.
Corporate insiders could easily evade the ring of security.
Statistics
showed that internal security breaches were growing faster than the
external security breaches; and it constituted almost half of the total
security breaches in the organizations... |
Excerpts
Contd...>>
|
|