Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Case study You have recently been appointed as the new IT risk manager of a countrywide online trading business called DirectToCust which sells items

image text in transcribedimage text in transcribed

Case study You have recently been appointed as the new IT risk manager of a countrywide online trading business called DirectToCust which sells items directly to the public. Its headquarters are located in Cape Town, in the Western Cape and have warehouses in Gauteng, KZN, and the Free state. The company employs over 200 call center agents and about 10 business managers for both inbound and outbound transactions and logistics. They work both day and night shifts in an open-plan workspace of around 40 x 38 m with each agent having their own desk, networked computers and essential office stationery to conduct business. Most, if not all, call center agents' desktop PCs are connected to a local network using Ethernet cabling while most line managers' laptops are wirelessly connected to enable free movement around the premises. All the servers, switches, router, gateways, firewalls, etc., are located at the adjacent IT office and maintained by one network administrator and six support technicians (four dayshifts and two nightshifts), the company opted for software-as-a-service, through various cloud computing services provider for all their software needs and therefore the presence of IT personnel is for day-to-day business support only. Before your recruitment, the company was experiencing a couple of complaints such as: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 21; 22; 23 11. 12. Theft of personal belongings during working hours. The network policy can be amended by the IT support team without the knowledge of the IT administrator. 13. 14. Employees spend more time on social media than working. Theft of customers' details for own and commercial use, using USB and other portable storage. Infected and corrupted employees and customer databases. The local IT team often experiences issues when communicating with the overseas cloud service provider team. All employees must change their password every week, and as a result, many employees who cannot memorise their new password simply write them down for safekeeping. Regular firewall breaches were observed during the last couple of months and resulting in bottlenecks and unauthorised access. Some employees can easily guess their colleague's password to log in. The website was recently hacked, disfigured and propaganda message posted, and it took the local IT team 48 hours to take back control of the website. Page 3 of 5 2022 Misappropriation of business funds by some employees. Easy access to the server room and malicious reconfiguration of proxy-server mostly during the night shift. Managers are unable to monitor employer activities live. Poor financial accountability and traceability; all managers are able to edit log files without authorisation. 15. Information and communications were being hijacked or looked into before reaching their destination. Question 1 (Marks: 50) Using the knowledge and expertise you have accumulated from the above case study information, answer the following questions. Q.1.1 In a 10-line paragraph, briefly explain the overall IT security and why it is important to always align the IT/IS strategy and business strategy. Q.1.2 Q.1.3 Q.1.4 Q.1.5 Q.1.6 Exploring the role and importance of the commission for the investigation of abuse of authority (CIAA) within an enterprise, and on a scale of 1 to 10, how do you rate the DirectToCust data security approach and implementation? As the new DirectTocust IT risk manager, how will you balance the right of staff privacy, the company network and physical security? The use of Adhoc network as presented above presents other security challenges; explain how you will make sure that wireless connectivity does not lead to network breaches. As the new DirectTocust IT risk manager, how will you protect the information and communications from being looked at during transmission before they reach their respective destinations? Based on the above case study, demonstrate how internal IT and network risk policies can play an important role in combating staff's lack of organisational compliance. (8) (8) (8) (8) (10)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managerial Accounting Tools for Business Decision Making

Authors: Jerry J. Weygandt, Paul D. Kimmel, Donald E. Kieso, Ibrahim M. Aly

3rd Canadian edition

978-1118727737, 1118727738, 978-1118033890

More Books

Students also viewed these Programming questions

Question

How might a service enterprise calculate expected revenues?

Answered: 1 week ago