Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization to: Analyze the components of information security asit applies to the scenario presented in Vampire

Transcript: Vampire Legends – A Role-Playing Simulation on Ethics, Privacy, and Security in the Multiplayer Online Game Business by Patricia Wallace

In this role-playing simulation you will be working on certain aspects of the sequel to the game Vampire Legends which is Ancient Age. You will be the acting CIO and will specifically work on the strategy and the budget.

The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security.

Interaction 1:

On logging into the application, the following tools are displayed on a laptop screen: E-Mail, Voicemail, Documents, Web Meeting, and Video Phone.

The icons of E-Mail, Voicemail, and Documents are highlighted, indicating there are new mails, messages, and documents.

Email:

Once the learner clicks on the email icon a screen containing the following information appears: From, Subject, Received. To the left, is the Mail Folders which has Inbox, Draft, Sent, and Trash listed one below the other. The inbox option is highlighted.

There are three new mails.

The first mail is from Shelby, CEO Digital Artists, with the subject ‘Strategy Session’. The mail is addressed to Dale, Jama and the Learner. He updates on the replacement of the learner instead of Jama whose down with flu. He instructs the members to take the poll which, can be found in the Docs folder to see which kind of campaign they will prefer. Information on the budget and the success of their previous game is also given.

He mentions that the team will be invited to the web meeting through IM once the poll is completed.

The second mail is from Stella, VP Finance, with the subject ‘Cost Estimates’, addressing the Learner and Jama. She briefs on the budget and the expense estimates.

The third mail is from Dale, VP Marketing, with the subject ‘Marketing’ briefing on the budget for the marketing campaign and emphasizing the importance of the campaign.

When clicked on the close button the learner is taken to the Home screen.

Voicemail:

The voice mail is from Jama, plays when clicked on the play button. A picture of Jama is at the left corner of the screen. He advises the learner about the implementation of information security- the need of a better firewall. Also, information on login credentials for the D&L bank which can be found in the Documents folder, is given.

Documents:

There are four new documents in the Documents folder.

The first document titled ‘Digital Artists Organizational Chart’ contains a chart with the hierarchy of the members in the organization.

The second document titled ‘Risk Matrix (from Jama)’ contains a table showing a draft of the various risks and their impact.

The third document titled ‘Budget and Advertising Campaign Poll’ contains two polls, one for identifying the best allocation strategy and the other to identify the best campaign approach. There are three options in each of the question. Only when, both the options are chosen, the submit button appears. When the learner clicks on the submit button it goes back to the documents folder.

The fourth document titled ‘Confidential Login Information (from Jama) contains the login ID: and password for the user.

There is a print button and close button when the document is open, in all the documents.

Instant Message:

Shelby invites the team members to the meeting as most of them are not in agreement with options in the poll.

Web Meeting:

The web meeting window shows the video of Shelby, participating in the meeting to the left of the screen. The names of the members present in the meeting is listed below the video.

The main screen shows the result of the poll for the questions. The team discuss based on the results, to come to a conclusion. A celebrity testimonial is chosen for the marketing campaign.

2 months later:

The following words appear on screen ‘2 Months Later’ in big block letters.

Interaction 2:

The following tools are displayed on a laptop screen: E-mail, Voicemail, Documents, Web meeting, and Video Phone.

The icons of E-Mail and Voicemail are highlighted, indicating there are new mails and messages

Email:

There are four new mails.

The first mail is from Shelby, with the subject ‘Congratulations!’ he congratulates the team on the high-demand of the new game Ancient ages and how the IT has handled the traffic wonderfully. He commends Dale’s efforts in the marketing campaign. He further congratulates the learner on being promoted as the CIO. He also brings into notice Jama’s concerns on Information privacy which will be investigated in a few months’ time.

The second mail is from the D&L bank with the subject ‘Your D&L Bank Account’. The mail is to confirm the identity of the user and remove their account limitation. It contains a link that reads ‘Click Here’, when clicked on goes to the login page of D&L Bank. There are two text boxes: one for the login and the other for the password.

The learner has to go back to the documents folder, to get the login credentials that Jama had sent earlier. When the login credentials are typed in, the submit button appears. On clicking the submit button, the message ‘Thank you for confirming your login information. We appreciate your business.’ appears at the bottom of the screen. The learner closes the screen by clicking on the close button at the top right corner of the screen which goes back to the mail.

The third mail is from Stella with the subject ‘Message from Customer’. It contains a mail from Devon Turnbull, governor’s son that has a snippet of what was posted on Gamer’s blog about him. Mr. Devon sounds enraged by how his information is leaked on the internet. He questions the ethics of the company. He also mentions that he’ll be contacting his attorneys.

The fourth mail is a reply from Shelby to Stella’s mail questioning, how the security breach happened.

Voicemail:

There is one new voice message from Lonnie demanding the learner to come to the meeting, because of the serious mail from Stella.

Instant message:

Shelby questions the learner and Lonnie asking what’s happening. Lonnie responds saying, someone has broken into the system to steal the information of about a million of the customers. He also mentions that the details will be put up in the documents folder. The team discuss further, to discover that the details of the customers haven’t been encrypted. Stella volunteers to layout the issues in the Docs folder. Shelby suggests everyone to review the issues and then meet.

Documents:

There are two new documents added to the documents folder.

One titled ‘Summary of the attack (from the learner and Lonnie), contains the details of the security attack and the effort in finding the offender. As of now, the person with the twitter handle ’DragonFly’ is presumed to be the main suspect.

The other document titled ‘To Crisis Management Team: Break-In Issues (from Stella)’ contains ten statements with ‘Agree’ and ‘Disagree’ option to each of the statement. The learner has to choose either if he/she agrees or disagrees to the given ten statements. Once the options for all the ten statements are chosen, a ‘Submit’ button appears. Clicking on it takes the learner back to the documents folder.

There is a print button and close button when the document is open, in both documents.

Interaction 3: Instant Message:

Once the poll in the documents folder is completed, Shelby invites everyone for a web meeting through Instant message.

Web Meeting:

The results of the poll is displayed in the middle of the screen. While the video of Shelby speaking appears on the left and the names of the members participating in the web meeting is listed below.

During the meeting, going-forward the action that has to be taken, and its consequences is discussed.

Shelby decides to come clean with the customers and the board members, by revealing what has happened to their personal information, although Dale and Vontae think otherwise. Shelby decides to take the games down until the encryption project is completed. They also decide to have a press release on what has happened to inform the public. Thus, the meeting comes to an end.

1 months later:

The following words appear on screen ‘1 Month Later’ in big block letters.

Interaction 4:

The following tools are displayed on a laptop screen: E-mail, Voicemail, Documents, Web Meeting, and Video Phone.

The E-mail icon is highlighted indicating, there are new mails.

There are two new mails. One from Shelby with the subject ‘Good News’ and the other from Stella-her reply to Shelby’s mail.

In Shelby’s mail, he breaks the news about the person who’s behind the security breach. Turns out that Dale is the one who broke in and downloaded the records. He is also the one who made the post on the Governor’s son on the Gamer’s blog. Currently he’s been put on administrative leave, until the whole situation is sorted out and Vontae has taken over as the Acting VP.

The mail from Shelby has more good news. She informs the team that since the games were back up with better security within a week, not many customers have been lost. The strategy to take full responsibility of the situation and make amends to the players has earned a lot of praise. The customers are pouring in, this in turn has increased the revenue.

When clicked on the close button the learner is taken to the Home Screen.


End of simulation exercise