NEC Detecting David Corporate Espionage Essay

User Generated

ounxng

Computer Science

New England College

Description

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: A HYPOTHETICAL SITUATION

A Hypothetical Situation
Student’s Name:
Institutional Affiliation:

1

A HYPOTHETICAL SITUATION

2

A Hypothetical Situation
Industrial espionage is the illegal collection of confidential company data for personal
gain at the firm's cost. Button (2019) submits that experts can commit espionage, especially if
they have prior knowledge concerning the modus operandum of their former employers.
Detecting David’s Corporate Espionage
The first strategy includes an in-depth assessment of ABC Company's login data from its
different sources. Sadok, Walch and Bednar (2019) suggest using advanced machines that can
detect an intrusion. The advanced equipment commences by analyzing...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags