SlideShare a Scribd company logo
1 of 9
TechFite Case Study
Background of Company:
TechFite is traded on NASDAQ and has approximately 1,000
employees. The company’s core business involves consulting
with and advising Internet organizations on promoting and
monetizing their online business ventures. Most of the company
operates legally and ethically with good internal financial
oversight. However, its Applications Division has recently been
reported in the news media for undertaking some disturbing
business practices. This division consults with start-ups on
launching new applications and apps online.
Assignment:
The chairperson of the board commissioned me, John Jackson,
to investigate the IT and business practices of the Applications
Division. I hold an MS in network security and am qualified as
a Certified Information Systems Security Professional (CISSP),
and I have 12 years’ experience in cybersecurity. In addition,
the chairperson has consented to allow Maria Harrison to assist
me. She is a private investigator who holds an MS in criminal
justice and has 15 years’ experience in corporate investigations.
Findings:
I interviewed Noah Stevenson, the chief executive officer
(CEO) of Orange Leaf Software LLC, whose company was cited
in recent news articles about the Applications Division.
Stevenson indicated his company had meetings with the
division’s representatives to possibly hire TechFite for
consulting services. Prior to divulging any technical details,
Applications Division head Carl Jaspers executed a
nondisclosure agreement (NDA) with Orange Leaf. As a part of
the preconsulting process, Orange Leaf’s CEO, chief technology
officer (CTO), and lead software engineer completed
questionnaires that included technical information about Orange
Leaf’s products. Ultimately, Orange Leaf decided not to hire
TechFite’s Applications Division for a variety of business
reasons. Months later, Noah Stevenson was disturbed to find out
a competitor was launching some products very similar to those
of Orange Leaf.
A similar scenario occurred in an interview with Ana
Capperson, CTO for Union City Electronic Ventures. She
described the same fact pattern as Orange Leaf’s. That is, after
this company decided not to use the Applications Division,
proprietary information eventually found its way into the hands
of a competitor.
Both potential clients provided copies of the questionnaires to
me, and they do contain information that could be of value to a
competitor. Copies of the NDAs executed by Carl Jaspers were
also provided. A check of the Applications Division’s customer
database revealed that the two competitors identified by
Stevenson and Capperson are existing clients of TechFite’s
Applications Division.
The Applications Division has a Business Intelligence (BI)
Unit, which gathers publicly available information about
companies in the Internet sector to benefit the division’s
marketing of its services and to aid clients. Such an operation is
legal and is common in the industry. However, I was interested
in what kind of oversight the unit had to prevent the abuses
alleged by Stevenson and Capperson.
IT Security Analyst Nadia Johnson of TechFite’s Applications
Division reviewed reports for the chief information security
officer (CISO) and revealed the organization had performed a
credible job of protecting the division’s network against
external threats. Vulnerability scanning, penetration testing, and
UTM (unified threat management) were all in place.
Documentation on internal oversight, especially of the BI Unit,
however, was lacking. There were blanket summaries that no
irregularities were found in internal operations. What was
missing were specific discussions of auditing users’ accounts,
checking for escalation of privilege, enforcing data loss
prevention (DLP) on sensitive documents, and surveilling
internal network traffic and activity.
Also disturbing was the lack of coverage on the critical issue of
safeguarding sensitive and proprietary information belonging to
existing clients, potential clients, and previous clients. No plan
was evident in keeping different clients’ information segregated
from each other and employing a Chinese wall methodology.
(No general policy at TechFite requires such a methodology.)
Within the BI Unit, the principles of least privilege and
separation of duties were not enforced. Every workstation and
computer had full administrative rights. In the marketing/sales
unit associated with the BI Unit, the same person can create
customers (clients), report sales, and post sales on the system.
In fact, there is no IT segmentation or separation between the
two units—data or applications. Each unit has full visibility and
access into the other.
Additionally, background checks into IT Security Analyst Nadia
Johnson raised some questions. First, Jaspers (head of
Applications Division) regularly gives Johnson’s boss, the
CISO, positive recommendations about Johnson during annual
reviews and she gets ample raises. Johnson’s social media posts
have photos and text documenting her frequently attending
social events hosted by Jaspers. A recent post even thanks
Jaspers for a gift on Johnson’s birthday. (Currently, no policy at
TechFite bars social relationships between IT Security staff and
those they conduct oversight on.)
We audited the client list database for the division (an action
never done by Johnson). Most of the clients are well-known
companies in the Internet arena. We researched the businesses
we did not immediately recognize online. All but three came up
as legitimate companies in the Internet field. These three
organizations—Bebop Software of Alberta, FGH Research
Group of Indiana, and Dazzling Comet Software of Florida—
had no real Internet presence. Further investigation revealed
they were all incorporated in Nevada. The registered agent for
all three corporations was Yu Lee, who attended graduate
school with Carl Jaspers at Stanford University.
We crosschecked with the TechFite Financial Unit and found all
three companies pay for services at TechFite with checks drawn
from the same bank: Freeworkers’ Pennsylvania Bank, NA in
Scranton, Pennsylvania. Given this pattern, these three clients
may not be actual, real clients but may simply be conduits for
moving money into TechFite’s sales figures for the division.
Since TechFite does not do business with Freeworkers and does
not have accounts there, the bank may provide an off-the-books
method of making payments elsewhere.
In auditing IT user accounts for the division, we found most to
be created in the normal manner for TechFite. (A manager
requests that an employee receives account access with the
appropriate privileges.) However, two accounts were created
solely upon the request of Carl Jaspers. The employees assigned
to the accounts have not worked for TechFite for over a year.
However, the accounts are in constant use. Emails associated
with these accounts are addressed to parties who are not clients
of TechFite. Some of the emails refer to intelligence-gathering
activities against various companies, including references to
“dumpster diving” and “trash surveillance.”
All TechFite employees at the time of hire sign a release
permitting company surveillance of any electronic
communications using TechFite equipment. Accordingly, we
remotely deployed Encase Endpoint Investigator on BI Unit
computers and digital devices. We discovered the Metasploit
tool (used for system penetration) on multiple machines. In
addition, evidence on the hard drives indicates recent
penetration and scanning activity into IP addresses for several
Internet-based companies.
Among the BI Unit employees, Sarah Miller, the senior analyst,
has the most traffic in scanning other companies’ networks.
Analysts Megan Rogers and Jack Hudson take direction from
Miller in doing similar efforts. Hudson also coordinates efforts
by third parties to gather intelligence through surveilling and
through mining companies’ trash. Furthermore, social media
research on Hudson revealed his membership in the Strategic
and Competitive Intelligence Professionals (SCIP), which has a
very strong code of ethics against covert and illegal BI
activities.
Finally, and very disturbing, the BI Unit, through its dummy
user accounts, has gained access to other groups and units
within TechFite outside its own division, without proper
authorization. Escalation of privilege has occurred on these
accounts to permit access to legal, human resources (HR), and
finance departments. Networking monitoring logs reflect regular
traffic between the BI Unit and these other departments to
examine financial and executive documents.
[End of report]
HR517-B01 Managerial Accounting
Assignment #3
1
ASSIGNMENT #3: COST SUMMARY FOR TRAINING
SESSION & ONGOING
EDUCATION
Miller Clinic is a privately owned Naturopathic Clinic in
Winnipeg, Manitoba that specializes in
classic Traditional Chinese Medicine (TCM) treatment. As part
of a five-year plan, Miller has
recently completed its expansion into four major areas of
Winnipeg. It now offers treatment at
locations in Fort Gary, St. Boniface, Tuxedo and North End. In
order to maintain consistency in
its services across all four of its locations and offer high-quality
treatment, Dr. Miller has
decided to offer training and ongoing education for its team of
87 staff and practitioners.
Management is trying to decide between two methods of
Knowledge-Based training and has
asked for your help.
Self-Directed Computer-
Based Distance Training
Classroom Training
Development time*
Initial: five months
Yearly updates: one week
Initial: one month
Yearly updates: one week
Internal developers
Three subject matter experts
(Dr. Miller, his wife and
assistant)
Three subject matter experts
(Dr. Miller, his wife and
assistant)
External developers
Web-based training developer
at $200,000
None
Training population
All primary participants
Maximum fifty participants
per session
Frequency
One time per participant
Presented quarterly;
participants attend as needed
Length
Administrative staff: one day
in total; at leisure
Practitioners: four days in
total; at leisure
Administrative staff: one day
Practitioners: four days
Location
In office or at other location
Rental space at $2,500 per
day all expenses included
* The development time estimated here is based on the fact that
the owners have subject matter experts with
experience in developing training curricula and that basic
modules will be used in each of the population-specific
training packages. If development time exceeds our estimate,
training costs will increase.
If the company decides to offer the classroom training, the staff
and practitioners will be paid to
attend the training and will be exempt from performing regular
duties. The company estimates
that revenue for four days of normal business practices is
approximately $40,000 among the four
locations. At each location, Miller employs two full-time
administrative staff who make $200 a
HR517-B01 Managerial Accounting
Assignment #3
2
day and two part-time administrative staff that make
approximately $80 a day and work 20 hours
per week (exactly half the hours of the full-time staff). The
remainder of Miller’s employees are
practitioners. The practitioners’ average salary is $500 per day.
The Millers will be providing
lunch if they decide to implement the classroom training which
they budgeted $1000 per day.
Write a report to Dr. Miller explaining which training method
you recommend he implement for
his employees. Prepare a cost summary and incremental analysis
to aid in the decision making.
Be sure to include any qualitative factors that should be
considered in this decision.

More Related Content

Similar to TechFite Case StudyBackground of CompanyTechFite is traded on.docx

Research paper - Forensic investigation, due diligence
Research paper - Forensic investigation, due diligenceResearch paper - Forensic investigation, due diligence
Research paper - Forensic investigation, due diligenceHarsh Chitroda
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsChristy Hunt
 
Read the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docxRead the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docxtawnan2hsurra
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Resume October 2015 for LI
Resume October 2015 for LIResume October 2015 for LI
Resume October 2015 for LIJon Huus
 
accounting information systems romney 12th edition chapter 1 manual solution
accounting information systems romney 12th edition chapter 1 manual solutionaccounting information systems romney 12th edition chapter 1 manual solution
accounting information systems romney 12th edition chapter 1 manual solutionIqbalFebriyanto
 

Similar to TechFite Case StudyBackground of CompanyTechFite is traded on.docx (8)

Research paper - Forensic investigation, due diligence
Research paper - Forensic investigation, due diligenceResearch paper - Forensic investigation, due diligence
Research paper - Forensic investigation, due diligence
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
 
Read the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docxRead the following and then answer the questions at the bottom.docx
Read the following and then answer the questions at the bottom.docx
 
LN Case Study
LN Case StudyLN Case Study
LN Case Study
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Resume October 2015 for LI
Resume October 2015 for LIResume October 2015 for LI
Resume October 2015 for LI
 
accounting information systems romney 12th edition chapter 1 manual solution
accounting information systems romney 12th edition chapter 1 manual solutionaccounting information systems romney 12th edition chapter 1 manual solution
accounting information systems romney 12th edition chapter 1 manual solution
 

More from bradburgess22840

Develop a detailed outline for the data collection plan to include .docx
Develop a detailed outline for the data collection plan to include .docxDevelop a detailed outline for the data collection plan to include .docx
Develop a detailed outline for the data collection plan to include .docxbradburgess22840
 
Develop a 3–4 page research paper based on a selected case study rel.docx
Develop a 3–4 page research paper based on a selected case study rel.docxDevelop a 3–4 page research paper based on a selected case study rel.docx
Develop a 3–4 page research paper based on a selected case study rel.docxbradburgess22840
 
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docx
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docxDevelop a 5- to 6-slide PowerPoint presentation for a staff meet.docx
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docxbradburgess22840
 
Develop a 5–10-year strategic plan for achieving specific health.docx
Develop a 5–10-year strategic plan for achieving specific health.docxDevelop a 5–10-year strategic plan for achieving specific health.docx
Develop a 5–10-year strategic plan for achieving specific health.docxbradburgess22840
 
Develop a 2–4-page proposal for a policy that should help to imp.docx
Develop a 2–4-page proposal for a policy that should help to imp.docxDevelop a 2–4-page proposal for a policy that should help to imp.docx
Develop a 2–4-page proposal for a policy that should help to imp.docxbradburgess22840
 
Develop a 10- to 12- slide PowerPoint Presentation designed for .docx
Develop a 10- to 12- slide PowerPoint Presentation designed for .docxDevelop a 10- to 12- slide PowerPoint Presentation designed for .docx
Develop a 10- to 12- slide PowerPoint Presentation designed for .docxbradburgess22840
 
DetailsPlease answer the following questions. 1.  Desc.docx
DetailsPlease answer the following questions. 1.  Desc.docxDetailsPlease answer the following questions. 1.  Desc.docx
DetailsPlease answer the following questions. 1.  Desc.docxbradburgess22840
 
Despite the literature supporting technology use in schools as ben.docx
Despite the literature supporting technology use in schools as ben.docxDespite the literature supporting technology use in schools as ben.docx
Despite the literature supporting technology use in schools as ben.docxbradburgess22840
 
Details httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docx
Details httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docxDetails httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docx
Details httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docxbradburgess22840
 
DescriptionCh .17Newborn transitioningCh. 18Nursing manag.docx
DescriptionCh .17Newborn transitioningCh. 18Nursing manag.docxDescriptionCh .17Newborn transitioningCh. 18Nursing manag.docx
DescriptionCh .17Newborn transitioningCh. 18Nursing manag.docxbradburgess22840
 
Description of the assignment The following 4 men created a p.docx
Description of the assignment The following 4 men created a p.docxDescription of the assignment The following 4 men created a p.docx
Description of the assignment The following 4 men created a p.docxbradburgess22840
 
Description of the AssignmentThis assignment presents a mo.docx
Description of the AssignmentThis assignment presents a mo.docxDescription of the AssignmentThis assignment presents a mo.docx
Description of the AssignmentThis assignment presents a mo.docxbradburgess22840
 
Description of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxDescription of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxbradburgess22840
 
Description This is a 4 page paper about either a creative genius o.docx
Description This is a 4 page paper about either a creative genius o.docxDescription This is a 4 page paper about either a creative genius o.docx
Description This is a 4 page paper about either a creative genius o.docxbradburgess22840
 
Describe your experience with electronic healthmedical record.docx
Describe your experience with electronic healthmedical record.docxDescribe your experience with electronic healthmedical record.docx
Describe your experience with electronic healthmedical record.docxbradburgess22840
 
Description Develop a paper describing how the knowledge, skill.docx
Description Develop a paper describing how the knowledge, skill.docxDescription Develop a paper describing how the knowledge, skill.docx
Description Develop a paper describing how the knowledge, skill.docxbradburgess22840
 
Describing Research FindingsResearchers take many steps to p.docx
Describing Research FindingsResearchers take many steps to p.docxDescribing Research FindingsResearchers take many steps to p.docx
Describing Research FindingsResearchers take many steps to p.docxbradburgess22840
 
Description I. Introduction A. Summarize the client. What is the rat.docx
Description I. Introduction A. Summarize the client. What is the rat.docxDescription I. Introduction A. Summarize the client. What is the rat.docx
Description I. Introduction A. Summarize the client. What is the rat.docxbradburgess22840
 
Describing DataNumerical MeasuresChapter 3McGraw-.docx
Describing DataNumerical MeasuresChapter 3McGraw-.docxDescribing DataNumerical MeasuresChapter 3McGraw-.docx
Describing DataNumerical MeasuresChapter 3McGraw-.docxbradburgess22840
 
Describes the use of Computers in Nursing in general clearly and com.docx
Describes the use of Computers in Nursing in general clearly and com.docxDescribes the use of Computers in Nursing in general clearly and com.docx
Describes the use of Computers in Nursing in general clearly and com.docxbradburgess22840
 

More from bradburgess22840 (20)

Develop a detailed outline for the data collection plan to include .docx
Develop a detailed outline for the data collection plan to include .docxDevelop a detailed outline for the data collection plan to include .docx
Develop a detailed outline for the data collection plan to include .docx
 
Develop a 3–4 page research paper based on a selected case study rel.docx
Develop a 3–4 page research paper based on a selected case study rel.docxDevelop a 3–4 page research paper based on a selected case study rel.docx
Develop a 3–4 page research paper based on a selected case study rel.docx
 
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docx
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docxDevelop a 5- to 6-slide PowerPoint presentation for a staff meet.docx
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docx
 
Develop a 5–10-year strategic plan for achieving specific health.docx
Develop a 5–10-year strategic plan for achieving specific health.docxDevelop a 5–10-year strategic plan for achieving specific health.docx
Develop a 5–10-year strategic plan for achieving specific health.docx
 
Develop a 2–4-page proposal for a policy that should help to imp.docx
Develop a 2–4-page proposal for a policy that should help to imp.docxDevelop a 2–4-page proposal for a policy that should help to imp.docx
Develop a 2–4-page proposal for a policy that should help to imp.docx
 
Develop a 10- to 12- slide PowerPoint Presentation designed for .docx
Develop a 10- to 12- slide PowerPoint Presentation designed for .docxDevelop a 10- to 12- slide PowerPoint Presentation designed for .docx
Develop a 10- to 12- slide PowerPoint Presentation designed for .docx
 
DetailsPlease answer the following questions. 1.  Desc.docx
DetailsPlease answer the following questions. 1.  Desc.docxDetailsPlease answer the following questions. 1.  Desc.docx
DetailsPlease answer the following questions. 1.  Desc.docx
 
Despite the literature supporting technology use in schools as ben.docx
Despite the literature supporting technology use in schools as ben.docxDespite the literature supporting technology use in schools as ben.docx
Despite the literature supporting technology use in schools as ben.docx
 
Details httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docx
Details httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docxDetails httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docx
Details httpsource.sakaiproject.orgviewsvnview=rev&rev=39.docx
 
DescriptionCh .17Newborn transitioningCh. 18Nursing manag.docx
DescriptionCh .17Newborn transitioningCh. 18Nursing manag.docxDescriptionCh .17Newborn transitioningCh. 18Nursing manag.docx
DescriptionCh .17Newborn transitioningCh. 18Nursing manag.docx
 
Description of the assignment The following 4 men created a p.docx
Description of the assignment The following 4 men created a p.docxDescription of the assignment The following 4 men created a p.docx
Description of the assignment The following 4 men created a p.docx
 
Description of the AssignmentThis assignment presents a mo.docx
Description of the AssignmentThis assignment presents a mo.docxDescription of the AssignmentThis assignment presents a mo.docx
Description of the AssignmentThis assignment presents a mo.docx
 
Description of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docxDescription of theNationalMilitary Strategy2018.docx
Description of theNationalMilitary Strategy2018.docx
 
Description This is a 4 page paper about either a creative genius o.docx
Description This is a 4 page paper about either a creative genius o.docxDescription This is a 4 page paper about either a creative genius o.docx
Description This is a 4 page paper about either a creative genius o.docx
 
Describe your experience with electronic healthmedical record.docx
Describe your experience with electronic healthmedical record.docxDescribe your experience with electronic healthmedical record.docx
Describe your experience with electronic healthmedical record.docx
 
Description Develop a paper describing how the knowledge, skill.docx
Description Develop a paper describing how the knowledge, skill.docxDescription Develop a paper describing how the knowledge, skill.docx
Description Develop a paper describing how the knowledge, skill.docx
 
Describing Research FindingsResearchers take many steps to p.docx
Describing Research FindingsResearchers take many steps to p.docxDescribing Research FindingsResearchers take many steps to p.docx
Describing Research FindingsResearchers take many steps to p.docx
 
Description I. Introduction A. Summarize the client. What is the rat.docx
Description I. Introduction A. Summarize the client. What is the rat.docxDescription I. Introduction A. Summarize the client. What is the rat.docx
Description I. Introduction A. Summarize the client. What is the rat.docx
 
Describing DataNumerical MeasuresChapter 3McGraw-.docx
Describing DataNumerical MeasuresChapter 3McGraw-.docxDescribing DataNumerical MeasuresChapter 3McGraw-.docx
Describing DataNumerical MeasuresChapter 3McGraw-.docx
 
Describes the use of Computers in Nursing in general clearly and com.docx
Describes the use of Computers in Nursing in general clearly and com.docxDescribes the use of Computers in Nursing in general clearly and com.docx
Describes the use of Computers in Nursing in general clearly and com.docx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

TechFite Case StudyBackground of CompanyTechFite is traded on.docx

  • 1. TechFite Case Study Background of Company: TechFite is traded on NASDAQ and has approximately 1,000 employees. The company’s core business involves consulting with and advising Internet organizations on promoting and monetizing their online business ventures. Most of the company operates legally and ethically with good internal financial oversight. However, its Applications Division has recently been reported in the news media for undertaking some disturbing business practices. This division consults with start-ups on launching new applications and apps online. Assignment: The chairperson of the board commissioned me, John Jackson, to investigate the IT and business practices of the Applications Division. I hold an MS in network security and am qualified as a Certified Information Systems Security Professional (CISSP), and I have 12 years’ experience in cybersecurity. In addition, the chairperson has consented to allow Maria Harrison to assist me. She is a private investigator who holds an MS in criminal justice and has 15 years’ experience in corporate investigations. Findings: I interviewed Noah Stevenson, the chief executive officer (CEO) of Orange Leaf Software LLC, whose company was cited in recent news articles about the Applications Division. Stevenson indicated his company had meetings with the division’s representatives to possibly hire TechFite for consulting services. Prior to divulging any technical details, Applications Division head Carl Jaspers executed a nondisclosure agreement (NDA) with Orange Leaf. As a part of the preconsulting process, Orange Leaf’s CEO, chief technology officer (CTO), and lead software engineer completed questionnaires that included technical information about Orange
  • 2. Leaf’s products. Ultimately, Orange Leaf decided not to hire TechFite’s Applications Division for a variety of business reasons. Months later, Noah Stevenson was disturbed to find out a competitor was launching some products very similar to those of Orange Leaf. A similar scenario occurred in an interview with Ana Capperson, CTO for Union City Electronic Ventures. She described the same fact pattern as Orange Leaf’s. That is, after this company decided not to use the Applications Division, proprietary information eventually found its way into the hands of a competitor. Both potential clients provided copies of the questionnaires to me, and they do contain information that could be of value to a competitor. Copies of the NDAs executed by Carl Jaspers were also provided. A check of the Applications Division’s customer database revealed that the two competitors identified by Stevenson and Capperson are existing clients of TechFite’s Applications Division. The Applications Division has a Business Intelligence (BI) Unit, which gathers publicly available information about companies in the Internet sector to benefit the division’s marketing of its services and to aid clients. Such an operation is legal and is common in the industry. However, I was interested in what kind of oversight the unit had to prevent the abuses alleged by Stevenson and Capperson. IT Security Analyst Nadia Johnson of TechFite’s Applications Division reviewed reports for the chief information security officer (CISO) and revealed the organization had performed a credible job of protecting the division’s network against external threats. Vulnerability scanning, penetration testing, and UTM (unified threat management) were all in place. Documentation on internal oversight, especially of the BI Unit, however, was lacking. There were blanket summaries that no irregularities were found in internal operations. What was missing were specific discussions of auditing users’ accounts, checking for escalation of privilege, enforcing data loss
  • 3. prevention (DLP) on sensitive documents, and surveilling internal network traffic and activity. Also disturbing was the lack of coverage on the critical issue of safeguarding sensitive and proprietary information belonging to existing clients, potential clients, and previous clients. No plan was evident in keeping different clients’ information segregated from each other and employing a Chinese wall methodology. (No general policy at TechFite requires such a methodology.) Within the BI Unit, the principles of least privilege and separation of duties were not enforced. Every workstation and computer had full administrative rights. In the marketing/sales unit associated with the BI Unit, the same person can create customers (clients), report sales, and post sales on the system. In fact, there is no IT segmentation or separation between the two units—data or applications. Each unit has full visibility and access into the other. Additionally, background checks into IT Security Analyst Nadia Johnson raised some questions. First, Jaspers (head of Applications Division) regularly gives Johnson’s boss, the CISO, positive recommendations about Johnson during annual reviews and she gets ample raises. Johnson’s social media posts have photos and text documenting her frequently attending social events hosted by Jaspers. A recent post even thanks Jaspers for a gift on Johnson’s birthday. (Currently, no policy at TechFite bars social relationships between IT Security staff and those they conduct oversight on.) We audited the client list database for the division (an action never done by Johnson). Most of the clients are well-known companies in the Internet arena. We researched the businesses we did not immediately recognize online. All but three came up as legitimate companies in the Internet field. These three organizations—Bebop Software of Alberta, FGH Research Group of Indiana, and Dazzling Comet Software of Florida— had no real Internet presence. Further investigation revealed they were all incorporated in Nevada. The registered agent for all three corporations was Yu Lee, who attended graduate
  • 4. school with Carl Jaspers at Stanford University. We crosschecked with the TechFite Financial Unit and found all three companies pay for services at TechFite with checks drawn from the same bank: Freeworkers’ Pennsylvania Bank, NA in Scranton, Pennsylvania. Given this pattern, these three clients may not be actual, real clients but may simply be conduits for moving money into TechFite’s sales figures for the division. Since TechFite does not do business with Freeworkers and does not have accounts there, the bank may provide an off-the-books method of making payments elsewhere. In auditing IT user accounts for the division, we found most to be created in the normal manner for TechFite. (A manager requests that an employee receives account access with the appropriate privileges.) However, two accounts were created solely upon the request of Carl Jaspers. The employees assigned to the accounts have not worked for TechFite for over a year. However, the accounts are in constant use. Emails associated with these accounts are addressed to parties who are not clients of TechFite. Some of the emails refer to intelligence-gathering activities against various companies, including references to “dumpster diving” and “trash surveillance.” All TechFite employees at the time of hire sign a release permitting company surveillance of any electronic communications using TechFite equipment. Accordingly, we remotely deployed Encase Endpoint Investigator on BI Unit computers and digital devices. We discovered the Metasploit tool (used for system penetration) on multiple machines. In addition, evidence on the hard drives indicates recent penetration and scanning activity into IP addresses for several Internet-based companies. Among the BI Unit employees, Sarah Miller, the senior analyst, has the most traffic in scanning other companies’ networks. Analysts Megan Rogers and Jack Hudson take direction from Miller in doing similar efforts. Hudson also coordinates efforts by third parties to gather intelligence through surveilling and through mining companies’ trash. Furthermore, social media
  • 5. research on Hudson revealed his membership in the Strategic and Competitive Intelligence Professionals (SCIP), which has a very strong code of ethics against covert and illegal BI activities. Finally, and very disturbing, the BI Unit, through its dummy user accounts, has gained access to other groups and units within TechFite outside its own division, without proper authorization. Escalation of privilege has occurred on these accounts to permit access to legal, human resources (HR), and finance departments. Networking monitoring logs reflect regular traffic between the BI Unit and these other departments to examine financial and executive documents. [End of report] HR517-B01 Managerial Accounting Assignment #3 1 ASSIGNMENT #3: COST SUMMARY FOR TRAINING SESSION & ONGOING EDUCATION Miller Clinic is a privately owned Naturopathic Clinic in Winnipeg, Manitoba that specializes in classic Traditional Chinese Medicine (TCM) treatment. As part of a five-year plan, Miller has recently completed its expansion into four major areas of Winnipeg. It now offers treatment at locations in Fort Gary, St. Boniface, Tuxedo and North End. In
  • 6. order to maintain consistency in its services across all four of its locations and offer high-quality treatment, Dr. Miller has decided to offer training and ongoing education for its team of 87 staff and practitioners. Management is trying to decide between two methods of Knowledge-Based training and has asked for your help. Self-Directed Computer- Based Distance Training Classroom Training Development time* Initial: five months Yearly updates: one week Initial: one month Yearly updates: one week Internal developers Three subject matter experts (Dr. Miller, his wife and assistant) Three subject matter experts
  • 7. (Dr. Miller, his wife and assistant) External developers Web-based training developer at $200,000 None Training population All primary participants Maximum fifty participants per session Frequency One time per participant Presented quarterly; participants attend as needed Length
  • 8. Administrative staff: one day in total; at leisure Practitioners: four days in total; at leisure Administrative staff: one day Practitioners: four days Location In office or at other location Rental space at $2,500 per day all expenses included * The development time estimated here is based on the fact that the owners have subject matter experts with experience in developing training curricula and that basic modules will be used in each of the population-specific training packages. If development time exceeds our estimate, training costs will increase. If the company decides to offer the classroom training, the staff and practitioners will be paid to attend the training and will be exempt from performing regular duties. The company estimates that revenue for four days of normal business practices is approximately $40,000 among the four locations. At each location, Miller employs two full-time administrative staff who make $200 a
  • 9. HR517-B01 Managerial Accounting Assignment #3 2 day and two part-time administrative staff that make approximately $80 a day and work 20 hours per week (exactly half the hours of the full-time staff). The remainder of Miller’s employees are practitioners. The practitioners’ average salary is $500 per day. The Millers will be providing lunch if they decide to implement the classroom training which they budgeted $1000 per day. Write a report to Dr. Miller explaining which training method you recommend he implement for his employees. Prepare a cost summary and incremental analysis to aid in the decision making. Be sure to include any qualitative factors that should be considered in this decision.