The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue

This epilogue accompanies Fall 2029.0. In 2011, Dillon Beresford, an IT security expert, discovered a number of new vulnerabilities affecting widely used industrial control system components. These new, previously unknown vulnerabilities, known as “Zerodays”, were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Security vendors and …

Read solution

Alexa: A Pandora’s Box of Risks

Launched in 2014, Amazon’s Echo and Echo Dot smart speakers led the rapid adoption of the category in the home and enabled artificial intelligence (AI) voice assistants to penetrate the everyday lives of millions of people. By 2019, Alexa, the virtual brain behind Amazon’s smart speakers, could play music, create reminders, get weather reports, control …

Read solution

PharmaCo

PharmaCo was a large integrated multinational pharmaceutical company. The Board of Directors met to discuss a possible amicable merger with a complementary competitor and to review a quarterly cybersecurity report. Before any of these discussions could begin, PharmaCo’s CFO interrupted by saying that the company’s customer database had been encrypted by hackers in a ransomware …

Read solution

Network Associates: Securing the Internet

Follow a company’s journey through uncharted territory of government regulation and the internet. In March 1998, Network Associates announced that it would begin selling high-performance encryption software through its Dutch subsidiary. Such a move appeared to the US government as a violation of export regulations, but the company was confident that it was acting within …

Read solution

Cheetah Mobile: Cross-Cultural Clashes Within a Technology Company Born Global

As a Chinese technology company founded in 2010, Cheetah Mobile (CM) officially launched its overseas strategy and entered international markets in 2012. As a born global company, CM pioneered the path of internationalization and achieved success in the international markets shortly after its creation. The case illustrates how CM finds and resolves intercultural conflicts.

Target Data Breach: Accounting for Contingent Liabilities

This is a flexible case that allows discussions of the form and content of 10,000 reports, management discussions and analysis, non-GAAP reports, and contingent liability accounting. Uniquely, Target included extensive disclosures about the data breach, but many questions remain as the data breach occurred shortly before the end of the year. Additionally, Instructor may compare …

Read solution

Facebook-Can Ethics Scale in the Digital Age?

Since its inception in 2004, Facebook has built a hugely successful company on a global scale and is the fifth most valuable publicly traded company in the world. The revelation of the Cambridge Analytica events in March 2018, which leaked 78 million user information in a 2016 US election cycle, revealed a trust / privacy …

Read solution

Cyber Breach at Target

In November and December 2013, Target Corporation suffered one of the largest cyber injuries to date. The security breach that occurred during the busy holiday shopping season caused the personal and credit card information of approximately 110 million Target customers to be compromised. The case outlines the details of the violation, the circumstances that led …

Read solution

Qihoo 360: A Subversive Tiger in the Internet Jungle

Qihoo 360 Technology Company was a leading Internet platform company in China and the leading provider of Internet and mobile security products by user base. The company entered China’s highly competitive Internet market relatively late and adopted the “freemium” model as its business base. “In the beginning,” said Qihoo founder Zhou Hongyi, “forget about how …

Read solution