Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/3737
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seetharaman, Priya | |
dc.contributor.author | Lahiri, Saikat | |
dc.date.accessioned | 2022-05-05T09:21:13Z | - |
dc.date.available | 2022-05-05T09:21:13Z | - |
dc.date.issued | 2015 | |
dc.identifier.uri | https://www.iimcal.ac.in/case-studies-lists#accordion-1 | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/3737 | - |
dc.description | Data Source :- Fictional; Secondary sources for the technical note. | |
dc.description | Setting :- Fictional – contemporary. | |
dc.description | Case Reference No. :- IIMC-CRC-2014-06 | |
dc.description | Case Length :- 12 pages + technical note + teaching note. | |
dc.description.abstract | BoD is a fictional case inspired by real life incidents. A middle eastern bank faces a cyberattack in the form of ‘unlimited operations’ where hackers gain access to prepaid card data. They use the data to clone the cards making it possible to withdraw large sums of money. A chance error by one of the cashers triggers an opportunity for a response by the security team of the bank. The case highlights the need for enterprise level information security governance with particular emphasis on risk assessment, creating a risk-response plan and/or a business continuity plan. It also focuses on the need to treat information security as part of business strategy and not just technology strategy. | |
dc.publisher | Indian Institute of Management Calcutta Case Research Center | |
dc.subject | Banking | |
dc.subject | Cyber-Attack | |
dc.subject | Enterprise Risk | |
dc.subject | Fraud | |
dc.subject | Fraudulent Transactions | |
dc.subject | Information Assurance | |
dc.subject | Information Security | |
dc.subject | It Governance. | |
dc.title | Bank of Dastaan: Unlimited Operations Cyber attack | |
dc.type | Case | |
Appears in Collections: | 2014-15 |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.