03 Task Performance 1 - ARG

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Pamela Clarisse C.

Fortunato
BSTM301A
Case Study#1: Uber Announces New Data Breach Affecting 57 Million Riders and
Drivers
Study Questions:
A. What is the write-up all about? What technology-related issue/s is/are apparent?

 The essay focuses entirely on the privacy issues that Uber Technologies, Inc., a ride-
sharing company, is facing. They acknowledged that some hackers had stolen their
personal information. In line with this, the issue we could identify in the aforementioned
situation was data privacy issues. Almost 600,000 people's names and driver's license
numbers could be exposed in a data breach, which may have an impact on Uber drivers
rather than their ride-sharing customers. All 57 million Uber passengers and drivers
globally had their names, e-mail addresses, and mobile phone numbers exposed in
addition to their driver's license numbers, according to a study by Bloomberg News.
B. What possible impacts or problems may arise in conjunction with the data breach?

 The data breach may harm the company, which is one of the potential effects or issues
that could develop. Once they can read the data, they can take it and frequently alter it.
Depending on the type of data involved, the repercussions may include database
corruption or loss, the disclosure of private information, the theft of intellectual
property, and the need for regulatory notification and possible restitution of those
impacted. Businesses that experience data breaches must deal with significant and
growing repercussions. This may be primarily a result of the heightened regulatory
requirements for notifying those whose information has been exposed. It will damage
the reputation of not just the business but also its staff and clients. Due to the
company's failure to perform its obligations and protect its employees, people who may
be harmed may file a lawsuit or demand compensation.
C. How can Uber Technologies, Inc. and other similar businesses prevent such from
happening again? What measures can you recommend?

 You can continue to use perimeter security and other safety precautions, but you also
need a data-centric solution that gives you tight control over who can look at which
records and information sets. This is prevented by Uber Technologies, Inc. and other
related companies. Encryption can offer this amount of control, but only the
appropriate sort. You can always choose who has access to a file or email if it is properly
secured. This prevents a data breach concerning that information even in the unlikely
scenario that your IT system has a data breach and unauthorized individuals gain access
to the data. A program like this can protect your business from unnecessarily high costs
and reduce the danger of a data breach to respectable levels. Even though they can
appear to be the style of the future, ridesharing applications are still a fairly young
technology. It's also critical to comprehend how new technology will affect your privacy.
For a more thorough investigation of ridesharing technology and suggestions on how to
pick them.
D. Considering this scenario, would you consider technological developments as
advantageous? Why or why not? Justify your responses.

 As a result, commercial interactions with foreign nations are made easier and
communication is improved. Thanks to breakthroughs in the use of strategic
technological trends, businesses are saving time and money. Trades progress faster,
particularly online. Deals and purchases are now encouraged and possible everywhere
in the world. On the other hand, I can see a scenario when modern technology has some
disadvantages. Because the system was so crucial, hackers might even get their hands
on your personal information and place you in awkward circumstances for businesses,
so we can't completely rely on technology.
Case Study #2: Possible Data Breach at Orbitz Affects 880,000 Payment Cards
Study Questions:
A. What is the write-up all about? What technology-related issue/s is/are apparent?

 The article focuses exclusively on the data breach that travel booking service Orbitz
experienced. In their release, they claimed to have found evidence of a possible data
breach that may have exposed information on 800,000 credit cards as well as thousands
of their clients. Additionally, the business claims that the website was used to access
information such as names, phone numbers, gender, dates of birth, physical and email
addresses, and credit card information. There is no concrete proof, but 40,000 clients
were impacted by massive data breaches that occurred over the past year.
B. What possible impacts or problems may arise in conjunction with the data breach?

 One of the possible consequences or problems that could arise from the data breach is
the harm to their business. They also want to sue due to the exposure of the private
information of thousands of users. Additionally, the trust and loyalty of their customers
will be compromised because so many people have access to their personal information,
harming the reputation of their company. Additionally, the issue will be the cause of
future failure in business operations. It will affect the company in that it won't attract
any new clients or investors, and it will be challenging to entice fresh potential clients.
C. How can Uber Technologies, Inc. and other similar businesses prevent such from
happening again? What measures can you recommend?

 Data breaches could affect your life differently than merely giving you a brief feeling of
anxiety. Businesses, governments, and people all face major challenges when sensitive
data is exposed. Using the internet, Bluetooth, content messaging, or the online services
you use, hackers can reach you whether or not you are online. A little vulnerability could
lead to a huge data leak if care is not taken. Everyone must be involved in preventing
data breaches, from end users to IT personnel, and everyone in between. The following
suggestions will help you avoid a data breach:
1. As soon as choices are available, software should be patched and updated.
2. Sensitive data is encrypted at the highest level.
3. Upgrading hardware when a manufacturer stops supporting a piece of software.
4. Enforcing BYOD security regulations, such as mandating that all devices be protected
by antivirus software and a business-grade VPN provider.
5. Enforcing multi-factor authentication and strong credentials to promote better user
cybersecurity habits. It may be beneficial to encourage people to begin utilizing a
password manager.
6. Informing staff members on the finest security procedures and defenses against social
engineering assaults.
D. Considering this scenario, would you consider technological developments as
advantageous? Why or why not? Justify your responses.

 For companies and business stakeholders, new technology has both many advantages
and disadvantages. Before selecting whether to implement cutting-edge technologies,
businesses must consider the dangers. The advantages of modern technology are as
follows:
1. Communication that is quicker, simpler, and more efficient
2. Improved production processes
3. Stronger ordering and stock management systems
4. The ability to come up with original, creative ideas
5. More marketing and promotion success
6. New channels for sales
Despite these advantages of technology, I still believe that some of us may view them
negatively, especially those businesses that have had data breaches. These cutting-edge
developments also bring with them a host of other issues like software problems, viruses, data
leaks, and more.

You might also like