Thursday, October 17, 2019
Industrial Espionage at XYZ Assignment Example | Topics and Well Written Essays - 750 words
Industrial Espionage at XYZ - Assignment Example That in itself is a felony under this stateââ¬â¢s laws and could also fall under embezzlement laws. The administrator discreetly monitored Mr. Robertsââ¬â¢ activities for quite some time before Human Resources decided it was time to make a move. Using Remote Access Software, namely Manage Engineââ¬â¢s OPS manager the administrator was able to ascertain that Mr. Roberts had inserted a USB thumb drive, which was in direct contravention of company policy. With this information, the administrator asked Mr. Roberts to meet with him in his own cubicle. Becoming worried, Roberts then proceeded to delete the information from the USB and denied that there was ever anything on the thumb drive. It was then confiscated and Mr. Roberts was suspended. Following procedures, and thinking that Mr. Roberts did not have the technical knowledge to permanently wipe the drive, the administrator made an image copy of the drive which he named Disk G. He and I have spent several days attempting to r ecreate any data that is contained on the original USB drive, which is still secured in the Companyââ¬â¢s vault. ... of them falling into other hands is dangerous, especially since the FBI considers industrial espionage as an act of Cold War, particularly when a foreign country such as China is involved in the act (2012). According to the referenced website, China is one of the biggest culprits in industrial espionage and only seldom recognized copyrights and patents outside their country. With what was found I recommended to the HR and administrator press charges against Mr. Roberts on behalf of their company. The district attorney concurs and assures me the case will be prosecutable, provided the administrator is able to discreetly explain what was on the disc. CASE 2 This case involves a group of students at the university who have been committing terroristic acts upon fellow students at the school. Acting on a tip that the group, considered a cult by campus security, was planning a series of coordinated attacks, security agents consisting of campus police, local police and Federal agents, raide d the hideout of the group, located in a house at a remote off campus location. Along with some papers, which include basic generic information about the studentsââ¬â¢ courses and do not contain any useful information, there was a floppy disk seized during the raid. The confidential informant assures the investigators that the disk is pay dirt and it contains very useful data on what, when and where the attacks are. Not only that, it is purported to include the names of group members. With that in mind I took the disk, labeled Case 2FDD Image, back to my computer lab to decipher its contents. The first step I undertook, before examining the contents, was to make an image of the disk, which was successful. This is to ensure the integrity of the disk is not compromised so that the subsequent
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.