Managing Information Resources: Ensuring Data Security
ICMR HOME | Case Studies Collection
» IT & Systems Case Studies Collection
This case study was compiled from published sources, and is intended to be used as a basis for class discussion. It is not intended to illustrate either effective or ineffective handling of a management situation. Nor is it a primary information source.
A Serious Threat or Just Hype?
While the debate continued on the dangers of pod slurping, there were some who argued that it was more of hype than a real threat. Though there was every possibility of the data getting stolen and used for malicious purposes, some experts opined that the threat had been over-publicized in the media. Vladimir Chrenavsky (Chrenavsky), CEO of Advanced Force, a maker of security software, remarked that the threat was "overblown"...
Mitigating the Threat
First, policy-based security measures where the employees were restricted from bringing any electronic devices to their place of work and ensuring strict physical measures that prevented intruders from gaining access to the information. Second, technological measures like disabling the USBs on the network, encrypting the data, using third party software to protect the data, not allowing data other than what was connected to the network to be stored on the individual computers of employees, like salespersons, etc...
Exhibit I: A Note on Data Theft
Case Studies Links:-
Short Case Studies,
Simplified Case Studies.
Other Case Studies:- Multimedia Case Studies, Cases in Other Languages.
Business Reports Link:- Business Reports.
Books:- Textbooks, Work Books, Case Study Volumes.
|Business Environment||Business Ethics||Business Reports||Business Strategy|
|Corporate Governance||Economics||Enterprise Risk Management||Finance|
|HRM||Innovation||Insurance||IT and Systems|
|Leadership and Entrepreneurship||Marketing||Miscellaneous||Operations|
|Project Management||Short Case Studies||Cases in other Languages||Free Case Studies|