Code Galore Case Study Analysis

Verified

Added on  2019/09/30

|6
|1238
|768
Case Study
AI Summary
This case study examines the challenges faced by Code Galore, a privately held company with a $15 million annual budget. The company's sales have fallen short of projections due to a combination of economic recession, software complexity, and competition. The analysis delves into the factors affecting the company's problems, including economic recession, knowledge gaps in security measures, and competition. It also identifies managerial, organizational, and technological issues and resources, highlighting the lack of information security awareness among senior management and the risks associated with cloud data storage. The study explores the roles of different decision-makers in IT security planning, implementation, and management, and suggests emerging IT security technologies to address the identified challenges, such as enhanced access control, robust protocols, and secure mobile cloud access.
Document Page
CODE GALORE CASELET
Code galore caselet
[DATE]
[Company name]
[Company address]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CODE GALORE CASELET
1) What are the most important business issues and goals for Code Galore?
Answer: Renowned for the groundbreaking services, Code Galore is held privately with
budget of $15 million every year. Sales in last year aggregated to US $ 13.5 million. The
investors of that company have the preponderance of stock of company. The share
options are offered to the employees in stock options form which is purchased and bought
for US $1 for single share (Behl, et al., 2011). Code galore spends approx. five percent of
the budget annually on the marketing. The effort of the marketing focus over portraying
the other function of finance applications an automation like point solutions in opposite
to the product of Code Galore. The sales got slower as compared to whatever was been
anticipated because of a mixture of financial recession as well as high cost and
complexity and strictness of the software of Code Galore. The main goals and objectives
include:
To enhance the sales of the company
To attain the profits and revenue for the investors
To lower the complexity of software.
2. What are the factors affecting the problem related to this case?
Answer: The factors which are affecting this case are:
The current recession in the economy, the variation in knowledge regarding the measures of
security within sky haven and Code Galore and competition from various other businesses
in the industry which have function automation software in market.
Management of information security was getting worse as there was issues regarding
knowledge between code galore and sky haven (Kaufman, et al., 2002). Instead of creating
Document Page
2
CODE GALORE CASELET
and developing a vision to develop the business, the CFO of code galore focused over the
financial issues. As there is no requirement of password for accessing the server, the Bots
are used in pace of information security of security engineers. Many employees resigned sue
to financial issues of code galore.
3. What are the managerial, organizational, and technological issues and
resources related to this case?
Answer: As per the case study, the technological, organizational and managerial resources
and issues which involve many of the senior management of organization. Below mentioned
are few of the highlights related to security issues which pertain to management:
Though, the information security is considered as very important for IP firm, Chief
Executive Officer owns a “wait and observe” attitude and behavior for it. Of the framework
of security which was proposed by Chief Information Security Officer does not create
considerable outcomes by next year, the budget for Information Security may be cut down
and may also lead to the firing of the employees as well as CISO. Many C-suite and Senior
Management of the organization are not familiar with concepts of information security.
The senior management of Code Galore are unaware regarding the fundamentals of
information Security like usage of the Virtual Private Networks and file permissions. Also
they have lackluster attitude for its usage because it may slow down the progress of research.
2. Technological Issues: Code Galore face few of the challenges from the viewpoint of
technology like:
The research division of Code Galore uses the cloud services for storage of data, which
makes the implications that usage which is not appropriate may cause breach of security after
Document Page
3
CODE GALORE CASELET
taking into consideration that cloud based technology is known as an emerging technology
and is not a robust one.
The challenge which is faced by company is application of aggregate companywide program
for information security.
3. Organizational Issues: Various organization based challenges are there that are faced by
Code Galore:
Many senior management are unaware about documents of standard information and security
policy which were existing in system. The backbones of Code Galore are scientist who work
in division of research. The scientist work in environment where the research data and ideas
are exchanged freely outside and within the research teams. These issues may lead to breach
of information which may cost up to billions and millions of revenue. The knowledge issue
4. What role do different decision makers play in the overall planning, implementing and
managing of the information technology/security applications?
Answer: management at senior level lay a significant role in making the decisions for
aggregate managing, implementing and planning the security/information technology
applications. Broad classification of levels of information security include:
Planning
Implementation
Management
Various decision makers are classified in to:
CISO: managing overall program for information security of the company
Sensory analysis and administration: analyze and design the solutions for information
security. They are accountable for implementation of solutions.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
CODE GALORE CASELET
Security managers: managing daily operations which pertains to information security.
Security Staffers: they are accountable to perform everyday activities of administration.
Security technician: they are considered as significant part of team of information security.
Security Consultants: they are consulted for problems or security linked implementation.
Help Desk Personnel: they are contacted to identify the issues and provide best solutions.
5: What are some of the emerging IT security technologies that should be considered in
solving the problem related to the case?
Answer: Few challenges are there related to information security that are faced by Code
galore.
Physical Access: For implementing biometric access or biometric system security clearance
and physical access must be offered meticulously on the basis of employee role (Subashini,
et al., 2011).
Intranet access: Applies the system for monitoring all applications that are used by user for
regulating personal level of clearance on the basis of interview.
Some IT based technologies which may help for resolving the challenges related to security
are:
Enhanced control of access: various access types presently implemented may be increased
by use of IT technologies such as RADIUS, Diameter, and TACACS.
Protocols: various types of Protocols are: SSL and S-Http and PGP, PEM and S/MIME
Mobile based access to cloud: Code Galore use cloud services for the purpose of data
storage therefore it is necessary to store information in cloud and make robust its security.
Document Page
5
CODE GALORE CASELET
References
Behl, A. (2011, December). Emerging security challenges in cloud computing: An insight to
cloud security challenges and their mitigation. In Information and communication
technologies (WICT), 2011 world congress on (pp. 217-222). IEEE.
Kaufman, C., Perlman, R., & Speciner, M. (2002). Network security: private
communication in a public world. Prentice Hall Press.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models
of cloud computing. Journal of network and computer applications, 34(1), 1-11.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]