You are on page 1of 2

ANJINETH B.

LAPULAPU
PRELIMINARY EXAM

CASE STUDY 1

1. What is the write-up all about? What technology-related issue/s is/are apparent?
 About the hackers who stole the personal information of approximately 57 million customers
and drivers, it was also reported that Uber discovered the data breach in late 2016 and then
waited almost a year to disclose the news. Well, the technology issue is that they obviously use
a computer and a website to hack the personal information.

2. What possible impacts or problems may arise in conjunction with the data breach?
 It may cause their customers to lose trust in them, and they may never trust them again.
 Most of their long-term customers will leave.
 Half of their employees will also be laid off.
 It may cause a major problem for their company, resulting in its ruin.

3. How can Uber Technologies, Inc. and other similar businesses prevent such from happening
again? What measures can you recommend?
 They should hire professional IT to their company who can really help them to solve this kind of
problem and double secure the personal information of the people because this is very
confidential, and they put this as their top priority. They should also be wise to pick their
employee who they can really trust because we don't know if one of your employees caused
the problem to your company.

4. Considering this scenario, would you consider technological developments as advantageous?


Why or why not? Justify your responses.

 Yes, because it can really help us, especially the companies/businesses, to help them solve
problems that may arise in the future, and it can also make it easier for them to do the things
that they wanted to do, especially with the website and others that is related to technology.

CASE STUDY 2

1. What is the write-up all about? What technology-related issue/s is/are apparent?
 The write-up is all about the booking company named Orbitz where all their data has been
exposed due to a technological issue called data breach. The said data breach discovered by the
company on March 1, 2018 allegedly may have exposed about 880,000 credit card information.
When data breach happens the names, payment card information, date of birth, e-mail address,
physical billing, gender and phone number may have been accessed Expedia owned company
said.

2. What possible impacts or problems may arise in conjunction with the data breach?
 The possible impact may arise in conjunction with the data breach are the following:
 All the information, data and transaction of the company and it is customer will be transparent
the data privacy will no longer takes place.
 It can also cause inconvenience to the customer because some of the credit cards that have
been involved to the breach can be temporarily unavailable to use to follow some of the credit
company rules.
 When data breach hits it is the company itself will suffer its complete loss from customers to
sales that will sometimes lead to temporary to permanent shutdown of the company.
 The company will lose its reputation when the breach will not be addressed on time.

3. How can Orbitz and other similar businesses prevent such from happening again? What
measures can you recommend?
 The Orbitz worked with the forensic investigation firm, cybersecurity experts and law
enforcement to prevent such thing from happening again. By these experts they will be able to
address the data breach faster and more accurate to eliminate and prevent unauthorized access
to the platform. My personal thoughts to improve their security measures is maybe they can
have a secondary authentication for their clients and customers to prevent hackers getting in
their platform.

4. Considering this scenario, would you consider technological developments as advantageous?


Why or why not? Justify your responses.
 Considering this scenario, I can consider that technological developments is still advantageous
despite of the data breach because with the help of technological developments the breach can
be addressed by improving their system, adding more security features that can be helpful for
the company’s security management it. All those things can only happen with the use of the
technological development and also the expertise and knowledge of the persons involved to this
kind of matter.

You might also like