Ask Homework Help/Study Tips Expert

Section A

Answer all the questions in this section.

This section should be completed within this document and submitted online. The questions from this section is based on the following case study. Please use examples from the case study to illustrate your answers. Make sure to provide both the relevant theory AND application for each question.

PRESCRIBED CASE STUDY: A new age for luxury (by Glacier Research)

Question 1

Traditional luxury retailers, like Gucci, Versace and Louis Vuitton can be described as YNAPs main competitors. Recently many of these luxury retailers also added an eCommerce (online sale) component to their business model. Develop a customer value map for YNAP, using thesethree top competitors. Make sure to explain YNAPs position on the map, and how they have influenced the luxury retail industry.

Question 2

Online shopping has been around for a while, yet it seems that the personal luxury goods market has stubbornly fought the shift to online retailing. Select a theoretical model that explains growth and adoption and apply it to the case of online luxury sales (8 marks). Also provide insight into the next phase of online luxury sales, using the theory you selected.

Section B
Answer all the questions in this section.

This section should be completed within this document and submitted online. Please use examples from the case study to illustrate your answers. Make sure to provide both the relevant theory AND application for each question.

CASE STUDY: LIBERTY REJECTS EXTORTION DEMANDS FROM HACKERS

Financial services group Liberty said on Sunday evening that it has made no concessions to extortion demands from unknown hackers after the firm's IT systems came under attack and the personal information of its clients was compromised.

During a press briefing, Liberty Group CEO David Munro described the attempt by hackers to obtain sensitive data as a "criminal act".Although Munro did not disclose a great deal of information about the identity of the hackers, the amount demanded or the number of affected clients, he did say that emails formed the bulk of the data stolen."It [the compromised information] seems to be emails and attachments. There is no evidence that customers have suffered financial losses ... All policies and contracts remain in force," said Munro.

"We are in full control of our IT environment. We deeply regret this act of criminality."
Munro said specific and sensitive details about the data breach could not be disclosed as a criminal investigation is pending.

He said Liberty was alerted about the data breach on Thursday evening and alerted the authorities. However, Liberty sent out an SMS to its clients only on Saturday evening, informing them of the breach of security and unauthorised access to its IT systems by unknown hackers.Asked why the group informed its clients two days after the initial alert on Thursday, Munro said the data breach was "out of the blue" and that these matters are "difficult to understand."He continued: "We can't prepare for this [kind of] event. It took us a couple of days to get to the point where we could inform clients and understand the implications of the extortion attempts."

He said the data breach has been limited to the company's insurance operations in South Africa, and that its money management arm Stanlib has not been affected.

The hackers informed Liberty of vulnerabilities in its systems and demanded payment from the company, failing which they would release sensitive information about the firm's clients to the public."We did engage the external party [the hackers] and we made no concessions to the extortion," said Munro.

Liberty said that since becoming aware of the security and data breach, it had taken immediate steps to secure its computer systems and had launched an investigation into the incident."We are on top of the situation and working hard to protect customers," said Munro. "We have devoted all efforts to protect customers and [their] details. We have assembled a full team of technology specialists that specialise in incidents like this. No money has been spared."

Data breaches are a rising threat across industries, and regulations over personal information have toughened up in recent years. Such regulation includes the Protection of Personal Information Act, which puts the onus on companies to store, protect and safely destroy personal information.A recent report by Australian cybersecurity researcher Troy Hunt along with Tefo Mohapi from iAfrikan Digital revealed that the sensitive personal information of nearly one million (934 000) South Africans who pay their traffic fines online had been publicly leaked. This leak contained identity numbers‚ email addresses‚ full names and passwords.A similar breach of personal information occurred in 2017 when the records of over 60 million South Africans were compromised.

Question 3

With regard to the security breach that took place:
3.1 Which category of security threat took place at Liberty?
3.2 How well did Liberty do in responding to the security breach?

Question 4

Liberty Group CEO David Munro stated: "We can't prepare for this [kind of] event. It took us a couple of days to get to the point where we could inform clients and understand the implications of the extortion attempts."Do you agree with this statement? Propose which steps Liberty can take to deal with future security threats.

Attachment:- Assessment.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M93043893
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question?


Related Questions in Homework Help/Study Tips

Review the website airmail service from the smithsonian

Review the website Airmail Service from the Smithsonian National Postal Museum that is dedicated to the history of the U.S. Air Mail Service. Go to the Airmail in America link and explore the additional tabs along the le ...

Read the article frank whittle and the race for the jet

Read the article Frank Whittle and the Race for the Jet from "Historynet" describing the historical influences of Sir Frank Whittle and his early work contributions to jet engine technologies. Prepare a presentation high ...

Overviewnow that we have had an introduction to the context

Overview Now that we have had an introduction to the context of Jesus' life and an overview of the Biblical gospels, we are now ready to take a look at the earliest gospel written about Jesus - the Gospel of Mark. In thi ...

Fitness projectstudents will design and implement a six

Fitness Project Students will design and implement a six week long fitness program for a family member, friend or co-worker. The fitness program will be based on concepts discussed in class. Students will provide justifi ...

Read grand canyon collision - the greatest commercial air

Read Grand Canyon Collision - The greatest commercial air tragedy of its day! from doney, which details the circumstances surrounding one of the most prolific aircraft accidents of all time-the June 1956 mid-air collisio ...

Qestion anti-trustprior to completing the assignment

Question: Anti-Trust Prior to completing the assignment, review Chapter 4 of your course text. You are a manager with 5 years of experience and need to write a report for senior management on how your firm can avoid the ...

Question how has the patient and affordable care act of

Question: How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians, and other providers with Medicare making a single payment for al ...

Plate tectonicsthe learning objectives for chapter 2 and

Plate Tectonics The Learning Objectives for Chapter 2 and this web quest is to learn about and become familiar with: Plate Boundary Types Plate Boundary Interactions Plate Tectonic Map of the World Past Plate Movement an ...

Question critical case for billing amp codingcomplete the

Question: Critical Case for Billing & Coding Complete the Critical Case for Billing & Coding simulation within the LearnScape platform. You will need to create a single Microsoft Word file and save it to your computer. A ...

Review the cba provided in the resources section between

Review the CBA provided in the resources section between the Trustees of Columbia University and Local 2110 International Union of Technical, Office, and Professional Workers. Describe how this is similar to a "contract" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As