Write an analysis of the security and privacy issues


Case Study Assignment: Intellectual Property Theft Analysis

Scenario

For your next rotational assignment, you will be working in the Corporate Security Services Office. Your specific assignment will be as a member of the team trying to assess the potential impact of an intellectual property theft by an insider working in the Property Holdings & Development (PHD) office. The head of PHD became suspicious after a key member of the Future Plans team resigned and joined a competitor in the RV Parks and Resorts business area. Log files on the employee's corporate laptop showed that a large number of files were downloaded from the company's file servers and were then uploaded to the individual's personal cloud storage account.

Since this is a training opportunity for you, your team leader has asked that you first review some resources about insider threats and intellectual property thefts. After you've done that, you should review the Padgett-Beale corporate history and the industry overview provided to you when you first started here as a management intern (see CSIA 300 Padgett-Beale Corporate Profile v1.pdf). As you review this information, you should pay close attention to information about the company's holdings, operations, and future plans for its Recreational Vehicle Parks business area.

Your deliverable for this assignment will be a briefing paper that identifies and discusses five or more security and privacy issues that could impact the company's ability to benefit from its intellectual property (especially its future plans and strategies). Since we already know that this was an insider theft issue, you should focus on that as well.After you identify and describe eachsecurity or privacy issue, include two to three additional points that managers should know about insider thefts of corporate intellectual property. Try to keep a neutral tone, that is, you should focus on issues and solutions not blame. You should also address the importance of protecting intellectual property. After you address the issues, identify and discuss at least 5 recommended solutions to the problem of intellectual property theft (include at least one technology solution and one policy solution). See the instructions below for additional information about length, formatting, and citing of sources.

Research

1. Review the Weekly readings to date. You should also review the readings/resources for data security and data loss prevention from Case Study.

2. Review this article about the impacts and costs of intellectual property thefts.

Article: The hidden costs of an IP breach: Cyber theft and the loss of intellectual property by John Gelinne, J. Donald Fancher and Emily Mossburg

3. Next, reviewthis technical report about insider theft of intellectual property and best practices for mitigating associated risks.

Article: Spotlight On: Insider Theft of Intellectual Property Inside the United States Involving Foreign Governments or Organizations by Matthew L. Collins, Derrick Spooner, Dawn M. Cappelli, Andrew P. Moore and Randall F. Trzeciak.

4. Then, review this Insider Threat brochure from the Federal Bureau of Investigation.

5. Find at least one additional relevant resource on your own.

Write

Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research into insider theft of intellectual property and your recommendations as to how the company should respond to the incident (including response to the current incident and detection and prevention strategies for the future). Be choosy about what you include - a busy executive or manager does not want to read lengthy, rambling reports.Don't be too choosy however. Your recommended content should be comprehensive and fully address the security and privacy issues related to theft of intellectual property by insiders.

At a minimum, your briefing paperfor this case study must include the following:

1. An introduction to the case scenario and the topic (use the information above and from the corporate history / industry overview).

2. An analysis of the security and privacy issues that includes five or more key points about the topic ("intellectual property theft by insiders").

3. Recommendations for 5 or more best practice basedactions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution. Include at least one recommendation for a policy based solution as well. Solutions that you suggested for Case Study #2 may work here as well but, you should include at least two new solutions that are unique to intellectual property and/or insider threats.

4. A closing section in which you restate the key issues and your recommendations.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Insider-Threat-Brochure.rar

Solution Preview :

Prepared by a verified Expert
Other Subject: Write an analysis of the security and privacy issues
Reference No:- TGS02953377

Now Priced at $30 (50% Discount)

Recommended (95%)

Rated (4.7/5)