Preview

Mr Zhu Qi

Powerful Essays
Open Document
Open Document
1893 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mr Zhu Qi
How should the Flayton Electronics team respond to the crisis? 1. Introduction
As information technology (IT) and information systems (IS) improving rapidly, a massive number of business activities can be done by IT and IS. However, it is inevitable that the risks and threats are increasing at the same time. Thus, new kinds of risks and crimes, which mentioned by Choo and Smith, may emerge during doing the cyber events like online payments, auctions, gaming, social networking sites and blogs (Choo & Smith, 2008). Obviously, in Flayton’s case, the company suffering from data breach which happened at the processes of online payments is a typical and common information technology problem recently.

Adebayo have defined data breach as well as security breach is an action that disclosing the secure and confidential information to an untrusted environment by an unauthorized individual (Adebayo, 2012). The Data Breach Investigations Report (DBIR) has shown that there were 855 incidents of data breach and 174 million compromised records in the world in 2011, most of which were attacked by hacker and malware (DBIR, 2012). As we can see that the probability of data breach happened in 2011 was relatively high, and what Caldwell predicted that the number of data breaches will continue to rise up in the later years (Caldwell, 2012). Thus, there is no doubt that it will be an enormous challenge for the companies like Flayton Electronics.

In Flayton’s case, the data breach informed by the Union Century Bank actually occurred in Flayton Electronics, a 25- year company. Because the young company never encountered such situation, the top management team face the new territory and difficulties, and the whole company were at stake. In this paper, the solution will be provided by the author. On the one hand, there is a debate on whether the company should inform their customers that their data and information had been revealed, if so, when and how to make

You May Also Find These Documents Helpful

  • Good Essays

    Grammarly Report generated on Tue, 09 Dec 2014 03:29 Grammarly DOCUMENT Page 1 of 4 SCORE LAW 531 Wk 6 IRAC Brief 6.2 98 of 100 Final Draft ISSUES FOUND IN THIS TEXT 1 PLAGIARISM 0% Contextual spelling 0 No errors Grammar 0…

    • 808 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mr Wu

    • 58146 Words
    • 233 Pages

    Australia and New Zealand Banking Group Limited: 324 Queen St Brisbane QLD 4000 Bank of America Merrill Lynch: Level 38, Governor Phillip Tower 1 Farrer Place Sydney NSW 2000 Commonwealth Bank of Australia: 240 Queen St Brisbane QLD 4000 HSBC Bank Australia Limited: 300 Queen St Brisbane QLD 4000 National Australia Bank Limited: 100 Creek Street Brisbane QLD 4000 Société Générale: RESO/CLT/ENT, TOUR GRANITE 17 Cours VALMY, 75886 PARIS Cedex 18 FRANCE Westpac Banking Corporation: 260 Queen St Brisbane QLD 4000…

    • 58146 Words
    • 233 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mr Zhang

    • 42353 Words
    • 170 Pages

    The Lakeside Company: Auditing Cases, 11th edition, has been updated in light of the accounting scandals of the early 2000s and the passage of the Sarbanes-Oxley Act of 2002, and the renewed interest in ethics within the accounting and auditing profession.…

    • 42353 Words
    • 170 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:…

    • 401 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Feng Menglong

    • 1873 Words
    • 8 Pages

    focused on a series of business dealings that are central to the plot development. A highly…

    • 1873 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    Mr. chen

    • 2187 Words
    • 9 Pages

    For modern Chinese society, “Fast food” is not a fresh concept. In 1980s, however, when the…

    • 2187 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    With more and more regularity, we learn about the loss of personal and financial information because of cybercrimes originating from around the world. Elections, power grids, movie productions companies, government agencies, and financial institutions are vulnerable to cybercriminals. Each time a breach occurs we hope that it will not reach our personal or business lives. However, the likelihood of staying cyber safe seems less and less likely to happen. One only has to look at the Equifax fiasco, which alone resulted in the loss of personal financial data for 143 million Americans.…

    • 92 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mr. Wu

    • 313 Words
    • 2 Pages

    The Black Cat and The Tell-Tale Heart both are famous novels. “The author Edgar Allan Poe (born Edgar Poe; January 19, 1809 – October 7, 1849) was an American author, poet, editor and literary critic, considered part of the American Romantic Movement. Best known for his tales of mystery and the macabre, Poe was one of the earliest American practitioners of the short story and is generally considered the inventor of the detective fiction genre. He is further credited with contributing to the emerging genre of science fiction. He was the first well-known American writer to try to earn a living through writing alone, resulting in a financially difficult life and career” (wiki). “‘The Black Cat’ is a short story by Edgar Allan Poe. It was first published in the August 19, 1843, edition of The Saturday Evening Post. It is a study of the psychology of guilt, often paired in analysis with Poe's "The Tell-Tale Heart". In both, a murderer carefully conceals his crime and believes himself unassailable, but eventually breaks down and reveals himself, impelled by a nagging reminder of his guilt” (wiki). “‘The Tell-Tale Heart’ is a short story by Edgar Allan Poe first published in 1843. It is told by an unnamed narrator who endeavors to convince the reader of his sanity, while describing a murder he committed. (The victim was an old man with a blind "vulture eye", as the narrator calls it.) The murder is carefully calculated, and the murderer hides the body by dismembering it and hiding it under the floorboards. Ultimately the narrator's guilt manifests itself in an auditory hallucination: the narrator hears the man's heart still beating under the floorboards” (wiki). However, these two novels have the same narration and theme, imagery and tone.…

    • 313 Words
    • 2 Pages
    Good Essays