critical thinking project reports
Critical Thinking: Project Reports (30 points)
Complete the following projects from your textbook:
- Preventing Corporate Espionage (project 7.1 at the end of Chapter 7)
- Using one of the websites listed in this book (you can also choose from the preferred resources in Chapter 1) or other resources, find a set of guidelines on general computer security. Write a brief essay comparing and contrasting those guidelines against the ones given in this chapter. Keep in mind that the guidelines in this chapter relate specifically to corporate espionage and not to general computer security.
- Handling Employees (project 7.2 at the end of Chapter 7)
- Write a brief essay describing steps regarding the handling of employees. Include all steps that you believe an organization should take to prevent corporate espionage. It is important that you support your opinions with sources and reasons.
If possible, visit a company and talk with someone in either the IT or personnel departments to determine how that company handles issues such as employee termination, rotation of duties, control of access to data, and so forth. Compare and contrast your steps to those used by the company you visited.
- Write a brief essay describing steps regarding the handling of employees. Include all steps that you believe an organization should take to prevent corporate espionage. It is important that you support your opinions with sources and reasons.
- Asset Identification in your Organization (project 7.3 at the end of Chapter 7)
- Using the Asset Identification table found in this chapter or a similar table of your own design, identify the most valuable data in your organization (school or business) and what parties would most likely wish to access that data. Then write a brief guideline on how you might go about securing that data. In this project, you should tailor your security recommendations to the specific type of data you are trying to protect and against the most likely perpetrators of industrial espionage.
Directions:
- Your report should be six-eight pages in length, not including the title or reference pages.
- Be sure to provide citations from your readings and additional research to support your statements.
- Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.
- You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.
Please follow APA style guidelines
There is SafeAssign Plagiarism Checker, If your score is above 25%, you will want to edit your assignment before submitting it for grading.
course name: CS666: Information Security Legal and Ethical Issues
Course Materials Required: Easttom, W. C. (2016). Computer security fundamentals (3rd ed.). Indianapolis, IN: Pearson. ISBN: 9780789757463