Case study You have recently been appointed as the new IT risk manager of a countrywide online trading business called DirectToCust which sells items directly to the public. Its headquarters are located in Cape Town, in the Western Cape and have warehouses in Gauteng, KZN, and the Free state. The company employs over 200 call center agents and about 10 business managers for both inbound and outbound transactions and logistics. They work both day and night shifts in an open-plan workspace of around 40 x 38 m with each agent having their own desk, networked computers and essential office stationery to conduct business. Most, if not all, call center agents’ desktop PCs are connected to a local network using Ethernet cabling while most line managers’ laptops are wirelessly connected to enable free movement around the premises. All the servers, switches, router, gateways, firewalls, etc., are located at the adjacent IT office and maintained by one network administrator and six support technicians (four dayshifts and two nightshifts), the company opted for software-as-a-service, through various cloud computing services provider for all their software needs and therefore the presence of IT personnel is for day-to-day business support only. Before your recruitment, the company was experiencing a couple of complaints such as: 1. Theft of personal belongings during working hours. 2. The network policy can be amended by the IT support team without the knowledge of the IT administrator. 3. Employees spending more time on social media than working. 4. Theft of customers’ details for own and commercial use, using USB and other portable storage. 5. Infected and corrupted employees and customer databases. 6. The local IT team often experiences issues when communicating with the overseas cloud service provider team. 7. All employees must change their password every week, and as a result, many employees who cannot memorise their new password simply write them down for safekeeping. 8. Regular firewall breaches were observed during the last couple of months and resulting in a bottleneck and unauthorised access. 9. Some employees can easily guess their colleague's password to log in. 10. The website was recently hacked, disfigured and propaganda message posted, and it took the local IT team 48 hours to take back control of the website. 11. Misappropriation of business funds by some employees. 12. Easy access to the server room and malicious reconfiguration of proxy-server mostly during the night shift. 13. Managers are unable to monitor employer activities live. 14. Poor financial accountability and traceability; all managers are able to edit log files without authorisation. 15. Information and communications were being hijacked or looked into before reaching their destination. Refer to the above case study: 1.2 Exploring the role and importance of the commission for the investigation of abuse of authority (CIAA) within an enterprise, and on a scale of 1 to 10, how do you rate the DirectToCust data security approach and implementation?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Case study
You have recently been appointed as the new IT risk manager of a countrywide online trading
business called DirectToCust which sells items directly to the public. Its headquarters are located
in Cape Town, in the Western Cape and have warehouses in Gauteng, KZN, and the Free state. The
company employs over 200 call center agents and about 10 business managers for both inbound
and outbound transactions and logistics. They work both day and night shifts in an open-plan
workspace of around 40 x 38 m with each agent having their own desk, networked computers and
essential office stationery to conduct business. Most, if not all, call center agents’ desktop PCs are
connected to a local network using Ethernet cabling while most line managers’ laptops are
wirelessly connected to enable free movement around the premises. All the servers, switches,
router, gateways, firewalls, etc., are located at the adjacent IT office and maintained by one
network administrator and six support technicians (four dayshifts and two nightshifts), the
company opted for software-as-a-service, through various cloud computing services provider for
all their software needs and therefore the presence of IT personnel is for day-to-day business
support only. Before your recruitment, the company was experiencing a couple of complaints
such as:
1. Theft of personal belongings during working hours.
2. The network policy can be amended by the IT support team without the knowledge of the
IT administrator.
3. Employees spending more time on social media than working.
4. Theft of customers’ details for own and commercial use, using USB and other portable
storage.
5. Infected and corrupted employees and customer databases.
6. The local IT team often experiences issues when communicating with the overseas cloud
service provider team.
7. All employees must change their password every week, and as a result, many employees
who cannot memorise their new password simply write them down for safekeeping.
8. Regular firewall breaches were observed during the last couple of months and resulting in a
bottleneck and unauthorised access.
9. Some employees can easily guess their colleague's password to log in.
10. The website was recently hacked, disfigured and propaganda message posted, and it took
the local IT team 48 hours to take back control of the website.
11. Misappropriation of business funds by some employees.
12. Easy access to the server room and malicious reconfiguration of proxy-server mostly during
the night shift.
13. Managers are unable to monitor employer activities live.
14. Poor financial accountability and traceability; all managers are able to edit log files without
authorisation.
15. Information and communications were being hijacked or looked into before reaching their
destination.

Refer to the above case study:

1.2 Exploring the role and importance of the commission for the investigation of
abuse of authority (CIAA) within an enterprise, and on a scale of 1 to 10, how do
you rate the DirectToCust data security approach and implementation?

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Web Based
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education