Computer Science
NEC Detecting David Corporate Espionage Essay

New England College

Question Description

I need support with this Computer Science question so I can learn better.

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Running head: A HYPOTHETICAL SITUATION

A Hypothetical Situation
Student’s Name:
Institutional Affiliation:

1

A HYPOTHETICAL SITUATION

2

A Hypothetical Situation
Industrial espionage is the illegal collection of confidential company data for personal
gain at the firm's cost. Button (2019) submits that experts can commit espionage, especially if
they have prior knowledge concerning the modus operandum of their former employers.
Detecting David’s Corporate Espionage
The first strategy includes an in-depth assessment of ABC Company's login data from its
different sources. Sadok, Walch and Bednar (2019) suggest using advanced machines that can
detect an intrusion. The advanced equipment commences by analyzing...

ChrisLabreTutor (18691)
Carnegie Mellon University

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
It’s my second time using SP and the work has been great back to back :) The one and only resource on the Interwebs for the work that needs to be done!

Anonymous
Thanks, good work

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4