100% found this document useful (1 vote)
164 views8 pages

Secom Group

This document summarizes a case study about Secom, a Japanese security services company, and its partnership with Jashopper.com, an e-commerce company. It outlines Secom's product suite, including advanced server hosting, physical and cyber security services, and identity and access control. It examines Jashopper's security needs and options before its CEO for addressing data protection as the company considers an IPO. Key questions are whether Secom's products are worth the investment, how much protection is needed, and if the decision would change with an IPO. The document analyzes terminology around digital certification, authentication, servers, internet service providers, gateways, and more to evaluate Secom's solutions.

Uploaded by

deepak mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
164 views8 pages

Secom Group

This document summarizes a case study about Secom, a Japanese security services company, and its partnership with Jashopper.com, an e-commerce company. It outlines Secom's product suite, including advanced server hosting, physical and cyber security services, and identity and access control. It examines Jashopper's security needs and options before its CEO for addressing data protection as the company considers an IPO. Key questions are whether Secom's products are worth the investment, how much protection is needed, and if the decision would change with an IPO. The document analyzes terminology around digital certification, authentication, servers, internet service providers, gateways, and more to evaluate Secom's solutions.

Uploaded by

deepak mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Secom : Managing Information Security in a

Risky World
Group 2 and 4

• 21B108 ANIRUDDHA KULKARNI •21B122 MOHIT MUNDADA


• 21B109 CHANDRACHUD •21B123 NAKUL BHASKARAN NAIR
• 21B110 CHANDRAMOULI •21B124 NANDINI N
• 21B111 CHIRAG CHAWLA •21B125 NAVANEETA BHANDIWAD
• 21B112 CHIRAG TATED •21B126 NAVSHRIYA LAPALIKAR
• 21B113 DEEPAK MISHRA •21B127 NIHAL PRAKASH
• 21B114 DEVI VAIDEHI •21B128 NIKHIL NARAYANAN
1. Personal Information Protection Law(PIPL)
Applicable to
companies that Enforces restriction on
Came into effect on
managed databases companies from using
April 1, 2005
with over 5,000 personal information
personal identities

Require companies to
Penalises corporations
take necessary
and even individuals in
measures to protect A matter of compliance
case of information
personal data from
leaks
information leaks
Breach of PIPL
Company Name Breach Perceived
Mastercard and Visa international 40 million credit card details leaked
Softbank BB 4.5 million users’ data leaked
Kakaku.com 20,000 consumer data records lost
Michinoku Bank CD-ROMs containing 1.3 million account
holders' details lost

Evolution of Legal & Policy Frameworks


LEGAL FRAMEWORK POLICY FRAMEWORK
 PIPL came into effect on April 01, 2005  Enforcement of network security
 Japanese version of U.S.’s Sarbanes-Oxley Law  Hiring information security officers
was expected to come into effect as early as 2008  Privacy mark and ISMS certification
 E-document law came into effect as of April 2005  Reducing the amount of personal information required
 Tightened qualification criteria for contractors
2. Analyze the growth, product, positioning, and reputation of the Secom
group
Growth
 Secom started in 1962 by offering patrolling services. In 1978, it established a joint venture in Taiwan and
eventually expanded in the U.S., the U.K., Korea, Thailand, Malaysia, China, and other overseas markets. In 2006, it
established Secom Trust Systems Co. Ltd., through merger of Secom Information Systems and Secom Trust Net
Product
 The services include everything from server hosting, advanced housing, firewall intrusion detection, etc. Introduces
the wide range of products that can be used to ensure secure operations.
Positioning
 Secom Security has strong marketing department which helps it to design effective and successful marketing
campaigns.
 Ability to scale production – Secom Security has a robust and flexible supply chain so it can meet the challenges of
managing success arising from highly successful marketing efforts that lead to surge in consumer demands for its
products.
Reputation
 Secom is a famous brand in Japan and in different regions of the world and it has an over 60% of market share. The
brand is recognized as one of the most reliable and trusted safety and security service provider globally
3. Analyze and comment on the various items of the Product suite offered by the
Secom to Jashopper. Examine the relevance of the packages and products.

1)Advanced Housing
Service Description Need Addressed
Server Hosting • Anti-seismic structure Protects consumer data from
• Fault-tolerant natural disasters
Physical/Cyber Security • Constant monitoring Minimizes threat of viruses
and hackers

2)Advanced Housing + ID/Access Control


Service Description Need Addressed
ID One Card • Controls access to Deters crime and averts errors
networks and PCs by employees

3) Total Security Assessment


Service Description Need Addressed
Complete assessment of • Analyzes security levels Jashopper’s site was not
vulnerability, and advisory from organizational protected with digital
policies to network encryption.
security
4. What are the options before Mr. Sekime, the CEO of Jashopper.com? What are the top
confusions? How does the data support a decision on the questions mentioned at the beginning
and end of the case ( Were the products worth the investment? How much protection is
enough? and whether the decision will change if the company were to go public in a few
years?)

Options before MR. Sekime:

• Advanced Housing services.


• Identification and Access control
• Service to assess the Vulnerability of physical and cyber security.

Top confusions:

• 1. Importance of data security and will it affect the further growth of the business.
• 2. How much to invest in data security.

How does the data support a decision on the questions mentioned:

• 1. It is showing that there is a constant increase in the penetration and users of the internet in the market.
• 2. There is a vast increase in security attacks and data leaks from 2004 to 2005.
• 3. Many companies have already increased their protection measures compared to 2004 .
5. Examine the applicability of the Security terminology provided in one of the exhibits of the
DIGITAL CERTIFICATION: case.
AUTHENTICATION:
IP
Application: Secures site with Application: An Internet
Application: Establishes identity
some type of digital encryption to Protocol (IP) address is used to
via information. In this case 80%
protect the information. connect to the Internet and
of personal information leak was
identify devices so that
Secom passport for web for each caused by insiders. hence
computers, like desktops, mobile
store and website would offer authentication is required.
devices, and servers can
more security. communicate with each other.

SERVER: ISP: GATEWAY:


Application: share data as well as to Application: ISPs allow users Application: A gateway is a
share resources and distribute work. access to networks that network node used in
A server computer can serve its own telecommunications that
computer programs as well; contain the required connects two networks with
depending on the scenario, this could equipment, enabling users to different transmission protocols
be part of a quid pro quo transaction, establish Internet together.
or simply a technical possibility.
connectivity.

FILE EXCHANGE SOFTWARE:


RACK:
Application: Tool designed to store
and distribute digital information Application: shelf used to store
servers that are often in the form of
In this case the city of Yuzawa electronic circuit board. Secom TS
leaked personal data of city provided racks to house customers’
residents through file exchange servers in the SDC
software.
THANK YOU!

You might also like