0% found this document useful (0 votes)
13 views

Data Security Cases - Student

Case 1: Mishippi Albactar's auditing firm recently transitioned to a computerized system storing files in a database. However, a clerk's mouse went missing and a manager's computer stopped working with a burnt smell. Albactar convened a meeting to address these issues and security weaknesses in her new system. Case 2: Arsenal established a department to vet player social media. Sensitive information about a player was leaked, and the fired employee who sent it claimed to have accidentally damaged a computer with player files. Arsenal also received a suspicious email that caused a computer to go blank. Arteta hired a forensic team to investigate security issues and prevent future incidents.

Uploaded by

Nathaniel Whyte
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Data Security Cases - Student

Case 1: Mishippi Albactar's auditing firm recently transitioned to a computerized system storing files in a database. However, a clerk's mouse went missing and a manager's computer stopped working with a burnt smell. Albactar convened a meeting to address these issues and security weaknesses in her new system. Case 2: Arsenal established a department to vet player social media. Sensitive information about a player was leaked, and the fired employee who sent it claimed to have accidentally damaged a computer with player files. Arsenal also received a suspicious email that caused a computer to go blank. Arteta hired a forensic team to investigate security issues and prevent future incidents.

Uploaded by

Nathaniel Whyte
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Data Security Cases

Read and complete the following scenarios:

Case 1:

Mishippi Albactar runs an auditing firm, her company has recently installed a computerised system where they no

longer store files in filing cabinets but on a computer system in a database. The company has twenty-five employees,

five of whom are managers, five supervisors, and the remainder, clerks who work in various departments such as

accounts, human resource and auditing. All managers have an office equipped with computers, supervisors share

rooms with clerks all of whom have computer access, however, each member of staff is only privy to certain

information. A week into operation with the new system, a clerk made a complaint that her mouse was missing, in the

same breath, a manager made mention that her computer was not turning on and there was a burnt smell coming from

it. It was also noted that a storm was expected to reach the island in a week’s time. Mrs Albactar decided to convene

a meeting to discuss the matters at hand. During the meeting, a manager informed the members that Sassy

Messy-Lampard rented an office space next door for her auditing business as well. Sassy has a well-equipped

business along with well-trained staff and IT personnel to oversee her business.

With the given situation, Mrs Albactar hired your group of experts to analyse the situation she is currently in. She

asks of you to identify to her, her areas of weakness in her system and for you to suggest solutions to be implemented

to protect her from the current events.

CASE 2:

Arsenal coach Mikel Arteta established a department where private and sensitive information about players of the

team is managed. Players’ tweets and blogs are vetted at this location before they are posted to the internet. Sensitive

information on the main striker of the team (player was seeing coming from a club at 4 am, the morning before a

game) was sent to the coach’s phone. Later on, that day, sky sports has received the information which made headline

news. In light of the developments with the striker, the person who had sent the message to the manager was

subsequently fired for not following procedures. The angered employee on his final day of work stated that he was

walking with a cup of coffee where he accidentally tripped and fell causing the coffee to damage a very important

computer with players’ contracts and progress reports.

In light of the recent developments in the league where Arsenal sits 10th place, an e-mail was received from a fan with

the title “Arteta we still have trust in you”. On opening the e-mail a message came up on the screen which reads

“Liverpool for the title” after which, the computer went blank. The matter was reported to Arsenal’s boss. Arteta then

decided to acquire an IT forensic team to deal with the situations faced.


As members of this Forensic team, you are required to ascertain what went wrong and suggest measures to safeguard

the department from future occurrences. `

Threat Evidence Protection Measure(s)

1. Define the terms:

a. Computer security

b. Data security

2. Differentiate between Back-up and Archive

You might also like