學門類別
最新個案
- Leadership Imperatives in an AI World
- Vodafone Idea Merger - Unpacking IS Integration Strategies
- V21 Landmarks Pvt. Ltd: Scaling Newer Heights in Real Estate Entrepreneurship
- Snapchat’s Dilemma: Growth or Financial Sustainability
- Did I Just Cross the Line and Harass a Colleague?
- Predicting the Future Impacts of AI: McLuhan’s Tetrad Framework
- Porsche Drive (A) and (B): Student Spreadsheet
- Porsche Drive (B): Vehicle Subscription Strategy
- TNT Assignment: Financial Ratio Code Cracker
- Winsol: An Opportunity For Solar Expansion
Hydropack India Pvt. Ltd.: Resolving a Data Breach
內容大綱
In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company’s information technology (IT) infrastructure. This had become crucial in the face of a product design leak resulting from an employee who had left Hydropack to join a rival company and taken valuable data with him in the process. The design that Hydropack had made was for a tender floated by a public sector company. The rival company had submitted the stolen design with a lower bid, putting Hydropack’s own bid in jeopardy. Darekar now had to rise to the challenge and ensure that Hydropack implemented secure IT infrastructure and policy to avoid further data leaks in the future. His objective was to ensure that all of Hydropack’s data in the form of designs and other confidential documents was suitably protected and accessible only to those who had authorized access.
學習目標
This case can be used in undergraduate- and graduate-level courses on risk management, information technology (IT), and cybersecurity. It can also be used to discuss the issues and challenges faced by family-run businesses. This case provides an opportunity for students to understand the challenges faced by small- and medium-sized enterprises in preventing data breaches. It explores the use of the 4A Framework (agility, accuracy, access, and availability) and applies it to the given scenario. Students are expected to utilize the data given in the case and exhibits to identify and assess various IT risks and to create contingency plans. After working through the case and assignment questions, students will be able to do the following:<ul><li>Become familiarized with potential IT risks faced by organizations and the implications of these.</li><li>Understand and analyze different risks in order to identify businesses’ vulnerabilities.</li><li>Apply the 4A framework in order to define policies that can prevent possible disruptions in organizational functioning.</li><li>Identify alternative risk treatment options and create contingency plans for IT risks.</li></ul>