• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project
  • Class Meeting – Online via Zoom

Week 9 – All Questions

October 21, 2017 by David Lanter

Case Study: A Hospital Catches the “Millennium Bug”

Introduction: To prevent disaster and assure business continuity, Year 2000 (also known as “Millennium Bug” or “Y2K Bug” or “Y2K”) compliance projects entailed the following technical steps which applied to: all categories of software (operating systems, transaction processing and decision support applications, vendor packages, custom and user-developed software applications, etc.), computing hardware (desktop, midrange and mainframe systems), and programmable devices (such as elevator controls – which contained date-sensitive microprocessors):

  • Inventory:         Identify hardware and software that might five rise to “Year 2000” (Y2K) problems
  • Analysis:           Examine code for date fields, determining which ones needed to be fixed
  • Remediation:   Alter the code for Y2K compliance (aka “renovation,” “conversion”)
  • Testing:             Ensure the altered code produces correct results
  • Migration:        Put the new code into production

Question 1: Based on the facts presented in the case, how far had Fetcher-Allen progressed in these steps by the end of June, 1998?  How likely is it that Fletcher-Allen would have achieved full-year 2000 compliance by December 31, 1999?  (Explain your reasoning, supported by specific evidence from the case and assigned readings.)

Question 2: At the end of the case, Sadlemire observes, “This project sometimes plays second fiddle to other projects that I believe are less critical.”  What “other projects” do you think he is referring to here? What advice would you give Sadlemire to help him address this issue of conflicting priorities?

Question 3: What should Bob Sadlemire tell the Board of Trustees at the June meeting?

Tagged With:

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (4)
  • 1b: Data Classification Process and Models (4)
  • 2a: Risk Evaluation (4)
  • 2b: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 3a: Creating a Security Aware Organization (4)
  • 3b: Physical and Environmental Security (3)
  • 4b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 5a: Business Continuity and Disaster Recovery (4)
  • 5b: Team Project Instructions (1)
  • 6a: Network Security (4)
  • 6b – Cryptography Public Key Encryption and Digital Signatures (4)
  • 7a: Identity Management and Access Control (4)
  • 7b: Computer Application Development Security (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in