Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
You have three attempts.
REF: Read Chapter 7 of the Easttom text, Industrial Espionage in Cyberspace
Information as an Asset
Real-World Examples of Industrial Espionage
Phone Taps and Bugs
Students are often burdened with the task of writing essays. They need to master various academic topics, understand how to integrate facts and arguments, and organize all of this information in a clear and logical way. This is not an easy task for many students. But fear not! We’ve got your back. Here at MoreEssays.com, we offer professional academic help that can take on all these tasks on your behalf. All you need to do is fill out the Order form with your paper’s details, and we will get started on it right away!