Question

In: Accounting

CASE 5.2 Business Case business case: Lax Security at Linkein Exposed. 7-Discuss why information security is...

CASE 5.2 Business Case

business case: Lax Security at Linkein Exposed.

7-Discuss why information security is a concern of senior managers.

8-Explain why someone who used the same password for several sites would need to change all those passwords. In your opinion, was LinkedIn negligent in protecting its main asset? Explain

Solutions

Expert Solution

7. Data security is the concern and responsibility of senior management. Because a company's operation, reputation and customer trust are effected which impacts on the firm's revenue, profits and competitive advantage. If the senior management continues to neglect the basic protections then the firm suffers a major crisis.

8. Passwords are atmost like daily habits to access varios websites on internet. Hackers crack one of those passwords and apply the same pattern to enter into other websites to steal information. So, it's a best practice to change your password once we get alter for our account hacking. In my opinion, yes Linkedln was negligent in protecting its main asset because it was using the outdated encryption method instead of up to date industry standard encryption. This resulted in knoweing the credentials of 161 million members to hackers and millions of money was spend to upgrade it.


Related Solutions

Discuss the corporate control of your business. Explain why your business in Mexico is exposed to...
Discuss the corporate control of your business. Explain why your business in Mexico is exposed to agency problems. Explain in your owns words.
a. Discuss the corporate control of your business. Explain why your business in Mexico is exposed...
a. Discuss the corporate control of your business. Explain why your business in Mexico is exposed to agency problems.
The use of a business case to obtain funding for an information security investment is MOST...
The use of a business case to obtain funding for an information security investment is MOST effective when the business case: A. relates information security policies and standards into business requirements B. relates the investment to the organization's strategic plan. C. realigns information security objectives to organizational strategy. D. articulates management's intent and information security directives in clear language. Correct Answer: B????? or C????? or others (of course...) ______________________ Note ■ Some good websites claim that the correct answer is...
Discuss network security in a business ethics.
Discuss network security in a business ethics.
Discuss security, ethical and societal issues by applying Information Technology (IT) in banks and why is...
Discuss security, ethical and societal issues by applying Information Technology (IT) in banks and why is it matter for banks to critically address these issues?
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
This video-based ethics case is titled "Trading Places." Managers are regularly exposed to nonpublic company information...
This video-based ethics case is titled "Trading Places." Managers are regularly exposed to nonpublic company information but not all managers choose to use nonpublic information for personal gain. This case explores the experiences of a day trader who was a member of a 17-year insider trading ring that resulted in profits in excess of $37 million. We will use this case as a source of a comprehensive and extensive discussion this week. Please access the e-case by following these instructions....
This video-based ethics case is titled "Trading Places." Managers are regularly exposed to nonpublic company information...
This video-based ethics case is titled "Trading Places." Managers are regularly exposed to nonpublic company information but not all managers choose to use nonpublic information for personal gain. This case explores the experiences of a day trader who was a member of a 17-year insider trading ring that resulted in profits in excess of $37 million. We will use this case as a source of a comprehensive and extensive discussion this week. Please access the e-case by following these instructions....
Should organizations be concerned with internal security threats? Why? (e-business)
Should organizations be concerned with internal security threats? Why? (e-business)
Define, discuss and develop information security policy with all its elements.
Define, discuss and develop information security policy with all its elements.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT