What are the security and privacy issues

Assignment Help Computer Engineering
Reference no: EM132144070

Question: Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research into insider theft of intellectual property and your recommendations as to how the company should respond to the incident (including response to the current incident and detection and prevention strategies for the future). Be choosy about what you include - a busy executive or manager does not want to read lengthy, rambling reports.Don't be too choosy however. Your recommended content should be comprehensive and fully address the security and privacy issues related to theft of intellectual property by insiders.

At a minimum, your briefing paperfor this case study must include the following:

1. An introduction to the case scenario and the topic (use the information above and from the corporate history / industry overview).

2. An analysis of the security and privacy issues that includes five or more key points about the topic ("intellectual property theft by insiders").

3. Recommendations for5 or more best practice based actions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution. Include at least one recommendation for a policy based solution as well. Solutions that you suggested for Case Study #2 may work here as well but, you should include at least two new solutions that are unique to intellectual property and/or insider threats.

4. A closing section in which you restate the key issues and your recommendations.

As you write your briefing paper, make sure that you address security issues using standard terms and definitions. See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts for definitions and terminology.

Information related to above question is enclosed below:

Attachment:- CaseStudy3.rar

Reference no: EM132144070

Questions Cloud

Probability that at least one head will occur : Tossing a fair coin three times, what's the probability that at least one head will occur?
Impact of stress on the amount of beta-endorphins : A study if the impact of stress on the amount of beta-endorphins released in the blood was reported. Researchers took beta-endorphin
Is this different from personal life decisions : Which psychological traps do you believe need to be watched for most in making smart decisions in management area? Is this different from personal life decision
What is the probability that the first one : If two M&Ms are chosen in succession, what is the probability that the first one will be brown and the second one will be blue?
What are the security and privacy issues : An analysis of the security and privacy issues that includes five or more key points about the topic ("intellectual property theft by insiders").
Estimate the probability of an individual fruit fly : Estimate the probability of an individual fruit fly having 80 or more facets in the eye? How sure are you of this answer and why? In one state
Describe how your research of a historical topic can help : Describe how your research of a historical topic can help you understand contemporary issues
What is the highest value you would still hold the stock : You decide to sell whenever the price reaches its highest 10% of values. What is the highest value you would still hold the stock?
Confidence interval for the difference in two proportions : Give a 95% confidence interval for the difference in the two proportions. (Do not use rounded values. Round your final answers to three decimal places.)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design the full adder using the minimum number of gates

A full adder is a circuit that has three inputs and produces two outputs: one corresponding to the sum and the other corresponding to the carry of the three.

  Discuss about the security considerations

As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments.

  Write the codes for paradise and airspeed

Draw the optimal coding tree and the (weighted) average code length. Show the steps. Write the codes for "paradise" and "airspeed".

  Compare the merits and demerits of atm to those of frame

atm and frame relay. please respond to the followingcompare the advantages and disadvantages of atm to those of frame

  Managing the webpage using php

When we open webpage, first folder images are displayed and when we refresh or click on any link it display second folder imagesis this possible utilizing the php.

  Crowdsourcing in the field of interface design takes tasks

crowdsourcing in the field of interface design takes tasks traditionally performed by specific individuals and spreads

  How is the client-server mechanism in x different from other

Explain how the ssh-agent and ssh-add programs enable noninteractive logins. How is the client-server mechanism in X different from others?

  Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

  Should more programmers be assigned to the project why

If the project manager feels that programming is falling behind schedule, should more programmers be assigned to the project? Why or why not?

  Discuss the design approach that will control traffic flow

Discuss the design approach that will control traffic flow, hence improving performance. Use diagrams where possible support your discussion points.

  What happens if you run exec csh in a unix shell

What happens if you run "exec ls" in a UNIX shell? Why?

  What are things you must know in order to apply means-ends

Means-ends analysis is a problem-solving technique. What are three things you must know in order to apply means-ends analysis to a problem?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd