Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after Davidâ€™s departure, it is discovered that a good deal of the ABC Companyâ€™s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect Davidâ€™s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document.
Read Chapter 7 of the Easttom text, Industrial Espionage in Cyberspace
Text Book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3
Information as an Asset
Real-World Examples of Industrial Espionage
Phone Taps and Bugs
The tools of industrial espionage.
Click HERE to watch or click embedded video below.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.