You are on page 1of 1

Case 8

Shanghai Wireless Cafe

Go to Shanghai Wireless Café website in the following link :


http://higheredbcs.wiley.com/legacy/college/turban/0471705225/shanghai/index.html?
newwindo w=true

Recently, you went into Jimmy’s office to chat with him about the new web-based applications
and their implications for the Shanghai Wireless Café. Jimmy wasn’t there, but you were
surprised to see that his office was open, his computer was on, and an application displayed
employee information on the screen. You’ve been reading about privacy and security laws and
data vulnerabilities, and so you shut off Jimmy’s monitor before leaving his office.

Questions:

1. What particular exposures and vulnerabilities can you identify for information
technologies at The Wireless Café? As the restaurant’s information systems become
automated, what are some intentional and unintentional threats the information is
exposed to?
2. You’d like to suggest that Jade and Jimmy institute a formal set of security controls
covering all of their computerized information. What physical and application controls
would be appropriate in a restaurant? Consider that the restaurant workers are in a
different setting than an office worker, they are quite mobile, and they often don’t have
full computer access to information.
3. Restaurants are much more prone to physical disasters, such as kitchen fires, that
typical offices are. You want to recommend to Jimmy and Jade that they prepare a
disaster recovery plan for the café’s data and software assets. What steps will you take
to help them prepare a disaster recovery plan? Consider the web site, web-based
applications, on-site applications, and all of the associated databases. Give your
recommendation based on the trend in Information Technology, such as: Virtualization,
Cloud Services: IAAS, PAAS or SAAS. More detail in term of application, services and
total cost of ownership is highly appreciate.

You might also like