Page 313 - Using MIS
P. 313

system users compete, they may have an incentive not to fol-  The downside of Mt. Gox was that its very nature made
            low the compensating procedures.                     it a perfect target. It was centrally located and accessible from
               PRIDE’s use of the cloud brings up another important   anywhere, and it had a very large sum of money that could be
            security concern, one that exists at both the enterprise and   electronically stolen. Hackers from around the world would
            inter-enterprise  levels:  How  secure  is  the  cloud  vendor?   never stop trying to steal from Mt. Gox. Gold is hard to steal
            The more important the information you store, the more   because it’s so heavy. But bits are light and easy to transport.
            attractive a target you become for attackers. The simplest   Healthcare records, personal identities, financial records, and
            example of this comes in the form of bitcoins.       credit card information are all in digital form now, too.
               In February 2014, Mt. Gox, the largest bitcoin exchange   The fall of Mt. Gox should cause one to wonder about
            at the time, lost about 850,000 bitcoins valued at $460   the security of cloud storage. Most of the time, we don’t
                  4
            million.  Mt. Gox declared bankruptcy and wouldn’t, or   even know the physical location of cloud data, let alone how
            couldn’t, explain where all the bitcoins and cash had gone.   well the data center is secured, who works there, what pro-
            Essentially, bitcoins represented a large cloud-based mon-  cedures and policies are in place, and so on. We will return
            etary system that was supposed to replace national curren-  to this question in Chapter 10; for now, just understand that
            cies. It was, and still could be, a revolutionary idea.  this issue exists.







                        DisCussion Questions


            1.  Summarize why security risk is higher for integrated da-  “Our system’s security ensures that no one can see your
              tabases than for information silos. Describe a factor that   clients’ data.” How do you respond?
              can compensate for this increased risk.            6.  Suppose the salesperson in question 5 says, “Only oth-
            2.  Using PRIDE as an example, explain how users’ incen-  ers who are coaching the same clients as you can see
              tives to protect data differ between an enterprise sys-  your client data.” How can you verify the truth of this
              tem and an inter-enterprise system. How does the use   statement?
              of  security  procedures  differ  between  the  two  types  of   7.  Suppose that a personal trainer at a health club uses a
              system?                                              trivial password, such as dog. One of that health club’s
            3.  Suppose you are a health club owner and you are ap-  members watches the personal trainer sign in, obtains
              proached by a PRIDE salesperson who says, “The PRIDE   that password, and later steals all of the data on the cli-
              database is located in an XYZ cloud facility,” where   ents who use that club.
              XYZ is the name of a large, reputable company, such   a.  Who is responsible for the data theft?
              as Amazon, Oracle, Microsoft, or IBM. You ask about   b.  How do you respond if you are the personal trainer
              data security, and the salesperson says, “You and I don’t   using the trivial password?
              know  anything  about  their  security,  but  it  has  to  be   c.  If you are the club owner, how will you likely learn
              better than the security you have on that server you’re   about this theft? How do you respond when you do
              operating in the closet down the hallway.” How do you   learn of it?
              respond?                                             d.  If you are a participating healthcare provider, how
            4.  If you were a personal trainer at a health club, explain   will you likely learn about this theft? How do you re-
              the value to you of having competitors’ data about cli-  spond when you do learn of it?
              ents you share. Explain the value to you of obtaining, if   e.  If you are a client who is using this system, whom do
              you can, data about competitors’ PRIDE clients who you   you hold accountable, and why?
              have never trained.                                8.  Where  was  Mt.  Gox  physically  located?  Is  the  physical
            5.  Suppose you are a personal trainer at a health club and   location of where your data is being stored important?
              you are approached by a PRIDE salesperson who says,   Why or why not?



            4 Robert McMillian, “The Inside Story of Mt. Gox, Bitcoin’s $460 Million Disaster,” Wired, March 3, 2014, accessed June 2, 2014, www.wired.com/
            2014/03/bitcoin-exchange.
                                                                                                                 281
   308   309   310   311   312   313   314   315   316   317   318