Which category of security threat took place at liberty

Assignment Help Other Subject
Reference no: EM132056416

Section A

Answer all the questions in this section.

This section should be completed within this document and submitted online. The questions from this section is based on the following case study. Please use examples from the case study to illustrate your answers. Make sure to provide both the relevant theory AND application for each question.

PRESCRIBED CASE STUDY: A new age for luxury (by Glacier Research)

Question 1

Traditional luxury retailers, like Gucci, Versace and Louis Vuitton can be described as YNAPs main competitors. Recently many of these luxury retailers also added an eCommerce (online sale) component to their business model. Develop a customer value map for YNAP, using thesethree top competitors. Make sure to explain YNAPs position on the map, and how they have influenced the luxury retail industry.

Question 2

Online shopping has been around for a while, yet it seems that the personal luxury goods market has stubbornly fought the shift to online retailing. Select a theoretical model that explains growth and adoption and apply it to the case of online luxury sales (8 marks). Also provide insight into the next phase of online luxury sales, using the theory you selected.

Section B
Answer all the questions in this section.

This section should be completed within this document and submitted online. Please use examples from the case study to illustrate your answers. Make sure to provide both the relevant theory AND application for each question.

CASE STUDY: LIBERTY REJECTS EXTORTION DEMANDS FROM HACKERS

Financial services group Liberty said on Sunday evening that it has made no concessions to extortion demands from unknown hackers after the firm's IT systems came under attack and the personal information of its clients was compromised.

During a press briefing, Liberty Group CEO David Munro described the attempt by hackers to obtain sensitive data as a "criminal act".Although Munro did not disclose a great deal of information about the identity of the hackers, the amount demanded or the number of affected clients, he did say that emails formed the bulk of the data stolen."It [the compromised information] seems to be emails and attachments. There is no evidence that customers have suffered financial losses ... All policies and contracts remain in force," said Munro.

"We are in full control of our IT environment. We deeply regret this act of criminality."
Munro said specific and sensitive details about the data breach could not be disclosed as a criminal investigation is pending.

He said Liberty was alerted about the data breach on Thursday evening and alerted the authorities. However, Liberty sent out an SMS to its clients only on Saturday evening, informing them of the breach of security and unauthorised access to its IT systems by unknown hackers.Asked why the group informed its clients two days after the initial alert on Thursday, Munro said the data breach was "out of the blue" and that these matters are "difficult to understand."He continued: "We can't prepare for this [kind of] event. It took us a couple of days to get to the point where we could inform clients and understand the implications of the extortion attempts."

He said the data breach has been limited to the company's insurance operations in South Africa, and that its money management arm Stanlib has not been affected.

The hackers informed Liberty of vulnerabilities in its systems and demanded payment from the company, failing which they would release sensitive information about the firm's clients to the public."We did engage the external party [the hackers] and we made no concessions to the extortion," said Munro.

Liberty said that since becoming aware of the security and data breach, it had taken immediate steps to secure its computer systems and had launched an investigation into the incident."We are on top of the situation and working hard to protect customers," said Munro. "We have devoted all efforts to protect customers and [their] details. We have assembled a full team of technology specialists that specialise in incidents like this. No money has been spared."

Data breaches are a rising threat across industries, and regulations over personal information have toughened up in recent years. Such regulation includes the Protection of Personal Information Act, which puts the onus on companies to store, protect and safely destroy personal information.A recent report by Australian cybersecurity researcher Troy Hunt along with Tefo Mohapi from iAfrikan Digital revealed that the sensitive personal information of nearly one million (934 000) South Africans who pay their traffic fines online had been publicly leaked. This leak contained identity numbers‚ email addresses‚ full names and passwords.A similar breach of personal information occurred in 2017 when the records of over 60 million South Africans were compromised.

Question 3

With regard to the security breach that took place:
3.1 Which category of security threat took place at Liberty?
3.2 How well did Liberty do in responding to the security breach?

Question 4

Liberty Group CEO David Munro stated: "We can't prepare for this [kind of] event. It took us a couple of days to get to the point where we could inform clients and understand the implications of the extortion attempts."Do you agree with this statement? Propose which steps Liberty can take to deal with future security threats.

Attachment:- Assessment.rar

Reference no: EM132056416

Questions Cloud

Explain how the illustrated statistical procedure helped : Describe how these statistical procedures been used to answer research questions - Explain how the illustrated statistical procedure helped
What is main focus of information-gathering in health care : What is the main focus of information-gathering in health care? How can care coordination efforts enhance the collection of evidence-based data and improve.
Examine the ethical dimensions of the topic : Examine the ethical dimensions of the topic, clearly identifying the challenges and conflicts the issue presents.
Compute the return on equity using dividend growth model : Compute the return on the equity (Re) using the Dividend Growth Model (DGM), and the Security Market Line (SML).
Which category of security threat took place at liberty : MBA DEM 2017E2 - Which category of security threat took place at Liberty - How well did Liberty do in responding to the security breach
How each category of stakeholder impacts the overall success : Evaluate how each category of stakeholder impacts the overall success of this corporation.
What types of interest rate risk is the bank exposed to : FIN 470 - Is the bank long-funded or short-funded? What types of interest rate risk is the bank exposed to? Explain.
What is the component after-tax cost of debt : If a firm’s tax rate is 40%, what is the component after-tax cost of debt for use in the WACC calculation?
Define how to resolve the identified issues : Identification one or more issues, related to your role on the committee. Proposed recommendations to resolve the identified issues.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd