Case study 3

timer Asked: Oct 20th, 2018
account_balance_wallet $20

Question Description

Please reword the attached file for plagarism without changing contex


For your next rotational assignment, you will be working in the Corporate Security Services Office. Your specific assignment will be as a member of the team trying to assess the potential impact of an intellectual property theft by an insider working in the Property Holdings & Development (PHD) office. The head of PHD became suspicious after a key member of the Future Plans team resigned and joined a competitor in the RV Parks and Resorts business area. Log files on the employee’s corporate laptop showed that a large number of files were downloaded from the company’s file servers and were then uploaded to the individual’s personal cloud storage account.

Since this is a training opportunity for you, your team leader has asked that you first review some resources about insider threats and intellectual property thefts. After you’ve done that, you should review the Padgett-Beale corporate history and the industry overview provided to you when you first started here as a management intern (see CSIA 300 Padgett-Beale Corporate Profile v1.pdf). As you review this information, you should pay close attention to information about the company’s holdings, operations, and future plans for its Recreational Vehicle Parks business area.

Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more security and privacy issues that could impact the company’s ability to benefit from its intellectual property (especially its future plans and strategies). Since we already know that this was an insider theft issue, you should focus on that as well. After you identify and describe each security or privacy issue, include two to three additional points that managers should know about insider thefts of corporate intellectual property. Try to keep a neutral tone, that is, you should focus on issues and solutions not blame. You should also address the importance of protecting intellectual property. After you address the issues, identify and discuss at least 5 recommended solutions to the problem of intellectual property theft (include at least one technology solution and one policy solution). See the instructions below for additional information about length, formatting, and citing of sources.



Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research into insider theft of intellectual property and your recommendations as to how the company should respond to the incident (including response to the current incident and detection and prevention strategies for the future). Be choosy about what you include – a busy executive or manager does not want to read lengthy, rambling reports. Don’t be too choosy however. Your recommended content should be comprehensive and fully address the security and privacy issues related to theft of intellectual property by insiders.

At a minimum, your briefing paper for this case study must include the following:

1.An introduction to the case scenario and the topic (use the information above and from the corporate history / industry overview).

2.An analysis of the security and privacy issues that includes five or more key points about the topic (“intellectual property theft by insiders”).

3.Recommendations for 5 or more best practice based actions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution. Include at least one recommendation for a policy based solution as well. Solutions that you suggested for Case Study #2 may work here as well but, you should include at least two new solutions that are unique to intellectual property and/or insider threats.

4.A closing section in which you restate the key issues and your recommendations.

As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology.

Submit For Grading

Submit your research paper in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)

Additional Information

  • To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least three of these resources into your final deliverable. You must also include one resource that you found on your own.
  • Your briefing paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources.

3.You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. See CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx file under Content > Course Resources.)

4.Your briefing paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx.

5.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

6.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Tutor Answer

School: University of Maryland



Date: 10/21/2018




The PHD (property holding & development) case centers on an insider who worked as a
member of the top leadership in management and was involved in coming up with strategies of
the company. After resigning and joining a competitor firm, the insider stole vital documents of
the previous employer. It was later on discovered that some log files had been uploaded to a
personal cloud account of the insider from his business laptop. This case study explores some of
the issues linked to security and privacy more so on company intellectual property (IP).
The main threat to privacy and security is the theft of client information. (Fancher,
Gelline, & Mossberg, 2016). This ranges from customer orders, quotes and other relevant data
belonging to the clients served by the firm. Source code breach which is turning out to be
common is another security and privacy concern of IP. Codes that were written by the firm’s
programmers or by the insider on the network are stolen. Despite the author, of the code if the
information was a target by the insider, the case is about this category.
Unauthorized access to business plans of the firm is also a security concern. It involves
many strategic and forward-looking initiatives of the firm. The business plan includes sales,
marketing and other programs pertaining to the business (Collins et al. 2013). Theft of trade

flag Report DMCA

Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors