Intellectual property theft

Assignment Help Basic Computer Science
Reference no: EM133137139

Your internship assignment takes you to the Corporate Security office, headed by the Chief Security Officer (CSO). This office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. At least one competitor is known to have received copies of the company's intellectual property through an economic development office within its country's government. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information from Padgett-Beale's existing hotel property within that geopoliticall jurisdiction. Another competitor, also operating in that geographic area, contacted Padgett-Beale's Corporate Security Office and disclosed that it had been sent URLs for web pages containing links to the resort plans by an unknown party. The other firm wanted to make it clear to Padgett-Beale that they did not condone nor participate in such illegal and unethical taking or receiving of another company's intellectual property.

As part of the company's response to this theft, the CSO's office has been asked to prepare a background briefing for company's executives that addresses the problem of protecting intellectual property stored in digital form. The briefing must include recommendations for best practices that the company's executives should be adopting to prevent / respond to such thefts.

Write a summary of your research and analysis for review by the CSO's senior staff. Your summary should begin by explaining the problem of intellectual property theft. Next, address the reasonable and customary processes and procedures which should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company's intellectual property (at a minimum, you must address data classification and marking, separation of duties, and least privilege). You should also identify and explain five or more best practices which the company should implement as it responds to this growing problem.

Reference no: EM133137139

Questions Cloud

What is open source software and layered architecture : What is Open Source Software? What is idea behind open source software? what is Layered Architecture? When used?
What is the cash flow from operations : Between Year 1 and Year 2, accounts receivable increased by $4,000 and accounts payable increased by $2,000. What is the cash flow from operations
Evaluating and refining the product in participative manner : Interactive Design involves understanding users, developing prototypes, and evaluating and refining the product in a participative manner"
What is calculation of the average days to sell inventory : A company has the following year-end information: What is the calculation of the average days to sell inventory for Year 2
Intellectual property theft : As part of the company's response to this theft, the CSO's office has been asked to prepare a background briefing for company's executives
OR 531 Analytics and Decision Analysis Assignment : OR 531 Analytics and Decision Analysis Assignment Help and Solution, George Mason University - Assessment Writing Service
Evaluate pressing ethical issue : Evaluate a pressing ethical issue brought up by modern information systems.
What are primary accounting information needs of manager : What are the primary accounting information needs of each manager? Identify one special-purpose management accounting report
Western book supply case study : Once you read the case study Your task is to create the given documents Project Charter - Stakeholder Register Change request form Scope Management Plan

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Student marks for a pre-defined set of courses

A course-mark system enables lecturers to enter student marks for a pre-defined set of courses and students enroled in those courses. Thus, marks can be updated, but the lecturers cannot change the basic course information, as the course lists are..

  Project implementation plan

Discuss some ways for building contingency and resilience into a roll-out schedule.

  Ram help resolve the von neumann bottleneck

Does a larger RAM help resolve the von Neumann bottleneck? Justify your response.

  Demonstrate connection to your current work environment

Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment.

  Problem regarding the fastest amount of time

Then you shake the jar violently for 1 minute and set the jar down. Which one of the following would settle the fastest, creating the clearest water in the fastest amount of time?

  Execute a visual basic net application

For this first Critical Thinking assignment you will be locate and execute a Visual Basic .NET application. You will need to download the data files.

  The jsp input page with the form containing four input

1). The JSP Input page with the form containing four input textboxes and the submit button. The form will be used to collect user's input typed in the textboxes ( Customer First Name, Customer Last Name, Item Description and Item Price ) and submit t..

  Reconsider ethical relativism

Do you agree that the Holocaust is a clear instance of where a cross-cultural judgment about moral wrong and right can be made?

  Interpretation of relationship between those being observed

Provide your interpretation of the relationship between those being observed. Be very discrete and do not have a conversation with those being observed.

  Correspondence exists between bolts and nuts

Given a set of n distinct bolts and n corresponding nuts, (a one-to-one correspondence exists between bolts and nuts)

  Communicates with the kdc twice

In Needham-Schroeder, user Alice wishing to speak with Bob has to communicate with the KDC only once, but in Kerberos user Alice communicates with the KDC twice

  Disaster recovery plan that outlines emergency strategies

Choose either a natural or man-made disaster. Create a disaster recovery plan that outlines emergency strategies, backup procedures, recovery steps,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd