What are the security and privacy issues

Assignment Help Computer Engineering
Reference no: EM132144070

Question: Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research into insider theft of intellectual property and your recommendations as to how the company should respond to the incident (including response to the current incident and detection and prevention strategies for the future). Be choosy about what you include - a busy executive or manager does not want to read lengthy, rambling reports.Don't be too choosy however. Your recommended content should be comprehensive and fully address the security and privacy issues related to theft of intellectual property by insiders.

At a minimum, your briefing paperfor this case study must include the following:

1. An introduction to the case scenario and the topic (use the information above and from the corporate history / industry overview).

2. An analysis of the security and privacy issues that includes five or more key points about the topic ("intellectual property theft by insiders").

3. Recommendations for5 or more best practice based actions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution. Include at least one recommendation for a policy based solution as well. Solutions that you suggested for Case Study #2 may work here as well but, you should include at least two new solutions that are unique to intellectual property and/or insider threats.

4. A closing section in which you restate the key issues and your recommendations.

As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology.

Information related to above question is enclosed below:

Attachment:- CaseStudy3.rar

Reference no: EM132144070

Questions Cloud

Probability that at least one head will occur : Tossing a fair coin three times, what's the probability that at least one head will occur?
Impact of stress on the amount of beta-endorphins : A study if the impact of stress on the amount of beta-endorphins released in the blood was reported. Researchers took beta-endorphin
Is this different from personal life decisions : Which psychological traps do you believe need to be watched for most in making smart decisions in management area? Is this different from personal life decision
What is the probability that the first one : If two M&Ms are chosen in succession, what is the probability that the first one will be brown and the second one will be blue?
What are the security and privacy issues : An analysis of the security and privacy issues that includes five or more key points about the topic ("intellectual property theft by insiders").
Estimate the probability of an individual fruit fly : Estimate the probability of an individual fruit fly having 80 or more facets in the eye? How sure are you of this answer and why? In one state
Describe how your research of a historical topic can help : Describe how your research of a historical topic can help you understand contemporary issues
What is the highest value you would still hold the stock : You decide to sell whenever the price reaches its highest 10% of values. What is the highest value you would still hold the stock?
Confidence interval for the difference in two proportions : Give a 95% confidence interval for the difference in the two proportions. (Do not use rounded values. Round your final answers to three decimal places.)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd