New England College Industrial Espionage Paper

User Generated

ivanlinequna

Writing

New England College

Description

Required Video

https://www.youtube.com/watch?v=8b9fYVG1FuY

PPT- Attached

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document.


Unformatted Attachment Preview

Computer Security Fundamentals by Chuck Easttom Chapter 7 Industrial Espionage in Cyberspace Chapter 7 Objectives ◼ ◼ ◼ ◼ Know what is meant by industrial espionage Understand the low-technology methods used Understand how spyware is used Know how to protect a system © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 2 Introduction ◼ Espionage ❑ Is NOT: ◼ ◼ ❑ Sophisticated glamour Exciting adventure Its ultimate goal: ◼ ◼ ◼ Collecting information Without fanfare Without knowledge of target © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 3 Introduction (cont.) ◼ Espionage ❑ NOT done only by governments and terrorists ◼ ❑ Spies for political and military goals Also done by private companies ◼ ◼ ◼ Industrial espionage. Billions of dollars. Companies fear to reveal they are targets. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 4 What Is Industrial Espionage? ◼ Industrial Espionage ❑ Spying to find out valuable information: ◼ ❑ Competitor’s projects, client list, research data While the goal is different than military espionage, the means are the same: ◼ Electronic monitoring, photocopying files © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 5 Information as an Asset ◼ ◼ ◼ Information can be a real asset. Billions are spent on research and development. How to value your information: ❑ VI = C + VG © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 6 Information as an Asset (cont.) ◼ ◼ ◼ Information is as much an asset as anything else. Worth more than the hardware and software that houses it. Much more difficult to replace. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 7 Information as an Asset (cont.) ◼ Data has value for two reasons: ❑ ❑ Time and effort spent to create and analyze it. Data often has intrinsic value. ◼ ◼ A proprietary process, invention, or algorithm A competitive edge © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 8 Information as an Asset (cont.) ◼ Asset identification ❑ ❑ Listing the organization’s assets www.cert.org/archive/pdf/tutorial-workbook.pdf ◼ Tutorial covering information security considerations © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 9 How Does Espionage Occur? ◼ Espionage can occur in two ways ❑ Easy low-tech way ◼ ◼ ❑ Employees simply take the data. Social engineering. Technology-oriented method ◼ Spyware ❑ Cookies and key loggers © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 10 How Does Espionage Occur? (cont.) ◼ Espionage can occur in two ways: ❑ Easy low-tech way ◼ ◼ ◼ Employees divulge sensitive data. Disgruntled employees. Motives vary. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 11 How Does Espionage Occur? (cont.) ◼ Espionage can occur in two ways: ❑ Easy low-tech way ◼ Information is portable. ❑ ◼ ◼ CDs, flash drives Social engineering. E-mail. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 12 How Does Espionage Occur? (cont.) ◼ Espionage can occur in two ways ❑ Technology-oriented method. ❑ Any monitoring software can be used. ◼ Spyware Keystroke loggers ◼ Capturing screenshots ◼ © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 13 Protecting Against Industrial Espionage ◼ Cannot make system totally secure ❑ ❑ ❑ ❑ ◼ Employ antispyware software. Use firewalls and intrusion-detection systems. Implement security policies. Encrypt all transmissions. Of no use against internal sabotage © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 14 Protecting Against Industrial Espionage (cont.) How to lessen risk of internal espionage ◼ ❑ ❑ ❑ Give out data on a “need-to-know” basis. Ensure no one person has control over all critical data at one time. Limit portable storage media and cell phones. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 15 Protecting Against Industrial Espionage (cont.) How to lessen risk of internal espionage: ◼ ❑ ❑ ❑ ❑ ❑ No documents/media leave the building. Do employee background checks. Scan PCs of departing employees. Lock up tape backups, documents, and other media. Encrypt hard drives of portable computers. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 16 Protecting Against Industrial Espionage (cont.) ◼ How to lessen risks of internal espionage ❑ Encryption software ◼ ◼ ◼ www.navastream.com www.securemessaging.com/products/cgfolder/index.htm www.smart-cardsys.com/security/ © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 17 Real-World Examples of Industrial Espionage ◼ Professor Hao Zhang ❑ ❑ Stealing trade secrets from universities Giving secrets to Chinese government © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 18 Real-World Examples of Industrial Espionage (cont.) ◼ Houston Astros ❑ ❑ Team and scouting information Allegedly stolen by competitor © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 19 Real-World Examples of Industrial Espionage (cont.) ◼ General Motors ❑ ❑ ❑ ❑ GM alleges that eight former employees transferred proprietary information to Volkswagen. GM sued in criminal court under RICO. GM sued in civil court for damages. Industrial espionage not restricted to technology companies. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 20 Real-World Examples of Industrial Espionage (cont.) ◼ Interactive Television Technologies, Inc. ❑ A break-in resulted in theft of data. ◼ ❑ Years of research and substantial financial investment Other companies shortly came out with competing products. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 21 Real-World Examples of Industrial Espionage (cont.) ◼ Bloomberg, Inc. ❑ ❑ ❑ BI provided services to a Kazakhstan. company; gave them software needed to use BI’s services. A KS employee, Oleg Zezev, illegally entered BI’s computer system. He sent an e-mail to Michael Bloomberg threatening extortion. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 22 Real-World Examples of Industrial Espionage (cont.) ◼ Avant Software ❑ ❑ ❑ ❑ Charged with attempting to steal secrets from a competitor. A former consultant for Avant took a job with Cadence. There were allegations on both sides. The criminal case was pled out. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 23 Industrial Espionage and You ◼ ◼ Most companies decline to discuss the issue. Larry Ellison, CEO of Oracle Corporation, has openly defended his hiring of a private detective to dumpster-dive at Microsoft. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 24 Summary ◼ ◼ ◼ ◼ Industrial espionage exists and will grow into an even larger problem. There are a variety of methods by which espionage can take place. An employee revealing information is the most common. Compromising information systems is an increasingly popular method of espionage. © 2016 Pearson, Inc. Chapter 9 Industrial Espionage in Cyberspace 25
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1
Industrial Espionage - outline
I.
II.

What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?


Running head: INDUSTRIAL ESPIONAGE

1

Industrial Espionage
Name
Institution

INDUSTRIAL ESPIONAGE

2
Industrial Espionage

What steps might have been taken to detect David’s alleged industrial espionage?
While there are several methods for conducting corporate espionage by competitors,
employee involvement or insider threat remains the most used and difficult to detect. However,
some methods exist that are useful for identifying this aspect of the problem, such as the one that
the company in the case scenario is experiencing. One of the measures that can be used in this
context is the evaluation of the log data for copying and transfer activities to extern...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags