Consider this hypothetical situation: Question
Question Description
Question :
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is
passed over for promotion three times. He is quite vocal in his
dissatisfaction with this situation. In fact, he begins to express
negative opinions about the organization in general. Eventually, David
quits and begins his own consulting business. Six months after David’s
departure, it is discovered that a good deal of the ABC Company’s
research has suddenly been duplicated by a competitor. Executives at ABC
suspect that David Doe has done some consulting work for this
competitor and may have passed on sensitive data. However, in the
interim since David left, his computer has been formatted and reassigned
to another person. ABC has no evidence that David Doe did anything
wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document.
—————————————–
Required Readings
Read Chapter 7 of the Easttom text, Industrial Espionage in Cyberspace
Text Book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3
Primary topics:
- Information as an Asset
- Real-World Examples of Industrial Espionage
- Steganography
- Phone Taps and Bugs
- Spear Phishing
—————————————-
Required Videos
The tools of industrial espionage.
Click HERE to watch or click embedded video below.
————————-
PPT Attached.
We offer the best custom essay writing services at an affordable rate. We have done this assignment before, we can also do it for you.