Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes;

CIS 152 Case Project Instructor: Dr. B. Dike-Anyiam

CIS 152 Case Project2

Please read this below scenario carefully, then respond to the questions that follow:

Henry Magruder made a mistake—he left a flash drive at the coffee station. Later, when Iris Majwubu was topping off her mug with fresh tea while taking a breather from her current project, she saw the unlabeled drive on the counter. Being the helpful sort, she picked it up, intending to return it to the person who’d left it behind.

Expecting to find a program from someone on the development team or a project management schedule, Iris slotted the drive in her computer. The system automatically ran a virus scan before opening the file explorer program. She had been correct in assuming the drive contained SLS company data files. There were lots of them. She opened a file at random: names, addresses, and Social Security numbers appeared on her screen. These were not the test records she expected; they looked more like confidential payroll data. The next file she picked was full of what seemed to be customers’ credit card numbers. Concerned, she found a readme.txt file and opened it. It read:

Jill, see files on this drive. Hope they meet your expectations. Wire money to account as arranged. Rest of data sent on payment.

Iris realized that someone was selling sensitive company data. She looked back at the directory listing and saw that the files spanned the range of every department at Sequential Label and Supply—everything from customer financial records to shipping invoices. She opened another file and saw that it contained only a sampling of the relevant data. Whoever did this had split the data into two parts. That made sense: just a sample to see the type of data and then payment on delivery.

Now, who did the drive belong to? She opened the file properties option of the readme.txt file. The file owner was listed as “hmagruder.” That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action.

Source: Whitman, Michael E. Principles of Information Security, 6th Edition. Cengage Learning

Case Exercises

Iris called the company’s security hotline. The hotline is an anonymous way to report suspicious activity or abuse of company policy, although Iris chose to identify herself. The next morning, she was called to a meeting with an investigator from corporate security, which led to more meetings with others from corporate security and then with the director of human resources and Gladys Williams, the CIO of SLS.

Discussion Questions (6.5 points total)

  1. Should Iris have approached Henry directly, or was the hotline the most effective way to take action? (1 point)

    1. Why do you think so? (1.5 points)

  2. Should Gladys call the legal authorities? (0.5 points)

    1. Which agency should she call? (0.5 points)

  3. Do you think this matter needs to be communicated elsewhere inside the company? (0.5 points)

    1. Who should be informed and how? (1 point)

    2. How about outside the company, yes or no and who? (0.5 points)

      1. Why did you respond yes or no to item 3b above? (1 point)

Ethical Decision Making (8.5 points total)

It seems obvious that Henry is doing something wrong.

  1. Do you think Henry acted in an ethical manner and why do you think so? (2 point)

  2. Did Iris act in an ethical manner by determining the owner of the flash drive and why do you think so? (2 point)

  3. Assuming that this incident took place in the United States, what law or laws has Henry violated? (2.5 point)

Suppose Iris had placed the flash drive back at the coffee station and forgotten the whole thing:

  1. Explain why her action would have been ethical or unethical (2 points).

Note: This case project must not exceed 1.5 pages, must be typed, Left aligned, Verdana font face, 11.5 font size. You must specify the question number that you are responding to (example, Question #2 or #2a. (You will lose 3 points if you fail to adhere to these instructions)

Note: This case study project:

  • Must NOT exceed 1.5 pages (source cited may be on a separate page)

  • Must be typed, Left aligned, 1.5 line spacing, Verdana font face and 12 font size.

  • Must have full names of group members listed on top.

  • One person can submit for each group.

  • Your response must be in the same order as the questions.

  • Example

  1. Should Gladys call the legal authorities? (0.5 points)

    1. Which agency should she call? (0.5 points)