You are on page 1of 5

Case 5 : Information Systems Security

Go to Shanghai Wireless Caf website in the following link :


http://higheredbcs.wiley.com/legacy/college/turban/0471705225/shanghai/index.html?
newwindow=true
Recently, you went into Jimmys office to chat with him about the new web-based applications
and their implications for the Shanghai Wireless Caf. Jimmy wasnt there, but you were
surprised to see that his office was open, his computer was on, and an application displayed
employee information on the screen. Youve been reading about privacy and security laws and
data vulnerabilities, and so you shut off Jimmys monitor before leaving his office.
Questions:
1. What particular exposures and vulnerabilities can you identify for information technologies at
The Wireless Caf? As the restaurants information systems become automated, what are some
intentional and unintentional threats the information is exposed to?
2. Youd like to suggest that Jade and Jimmy institute a formal set of security controls covering
all of their computerized information. What physical and application controls would be
appropriate in a restaurant? Consider that the restaurant workers are in a different setting than an
office worker, they are quite mobile, and they often dont have full computer access to
information.
3. Restaurants are much more prone to physical disasters, such as kitchen fires, that typical
offices are. You want to recommend to Jimmy and Jade that they prepare a disaster recovery
plan for the cafs data and software assets. What steps will you take to help them prepare a
disaster recovery plan? Consider the web site, web-based applications, on-site applications, and
all of the associated databases

You might also like