SlideShare a Scribd company logo
1 of 15
%38
%9
%5
SafeAssign Originality Report
Computer Security: Foundations - 201950 - CRN163 - Zavgren •
Week Eight Assignment
%51Total Score: High riskSanthosh Muthyapu
Submission UUID: febbc9ef-e6b9-70f0-6bf0-fe171274dcc9
Total Number of Reports
1
Highest Match
51 %
Santhosh Muthyapu week 8.docx
Average Match
51 %
Submitted on
08/20/19
10:16 AM EDT
Average Word Count
666
Highest: Santhosh Muthyapu week 8.docx
%51Attachment 1
Institutional database (4)
Student paper Student paper Student paper
Student paper
Global database (3)
Student paper Student paper Student paper
Internet (2)
writemyclassessay atlatszo
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 666
Santhosh Muthyapu week 8.docx
7 5 6
3
8 9 1
4 2
7 Student paper 5 Student paper 8 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport?attemptId=2118e265-
8842-4fba-87df-
67e2234daca3&course_id=_44439_1&download=true&includeD
eleted=true&print=true&force=true
Source Matches (17)
Student paper 77%
atlatszo 63%
Student paper 62%
writemyclassessay 94%
Student paper 68%
Running Head: INDUSTRIAL ESPIONAGE ALLEGED BY
DAVID 1
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID DOE 2
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID Name:
Santhosh Muthyapu Course: Computer Security: Foundations
Date of Submission: 08/20//2019
The steps ought to have been taken in detecting Industrial
Espionage Alleged by David Doe
David Doe was a network administrator for the ABC company.
The ABC company ought to have taken various steps in
detecting Industrial Espionage alleged by
David Doe. First, it should evaluate threat and risk data as well
as log data from numerous sources, intending to acquire
information about security that would
enhance instant response to security incidents. The manager
should be in place to detect any warning signal. An instance is
when David is unhappy since he is
passed over for promotion three times. The vital warning signs
that a representative may have incorporates bringing home
materials having a place with the
organization, being keen on things outside their duties, mainly
that are related to the contender of the organization. However,
David is alleged to have duplicated the
company’s research after quitting the company and starting his
own consulting business (Ho & Hollister, J2015) To predict
risks in the network traffic, and dangerous
malware, the company should install signature and behavior-
based detection devices. Advanced Cyber Intrusion Detection
enhance this. To enable immediate
response as soon as the alerts of faults, attacks, or misuse
indications, there should be a correlation, analysis, and
collection of server clients’ logs. For the
integrity of local systems, it is essential to ensure regular
checks. It was necessary for intrusion finding (Jin & van Dijk,
2018). This involves an outline of possible
security liabilities in software and operating systems
applications. Use of Vulnerabilities Assessment to continually
monitor all data flows. Conservative security
actions to formerly undiscovered detection of radical malware,
which includes advanced email threat detection and advanced
adamant systems. To lessen compliance
risks through the utilization of Software Compliance, they
should consist of automatic check compliance guidelines and
the instant reporting of breaches. Steps
ought to be taken to prevent David Doe Perpetrating Such an
Offense
There are various available steps, ought to have been made to
avoid possible industrial espionage. The first step is to become
aware of any alleged industrial
espionage is through identifying information that might
critically affect the company is mislaid to the public. The
manager in charge of the information security of a
company should be in a position to identify the intellectual
property, the residential locality of the IP, and the value of the
IP. This enhances them to provide
control and protection of any individual who has access to the
company’s information. It is also essential to have a risk
assessment; this enhances an easy
identification of security vulnerabilities available to the
company. The organization ought not to print appropriateness
data except if they are entirely fundamental.
Physical security ought to have been guaranteed by verifying
every vital archive that has been printed and is secured a
bureau. Duplicate verification innovation ought
to be contributed to evade touchy data to be replicated. Another
technique is avoiding PC secret activities by utilization of
infections and Trojan ponies (Heembrock,
2015). To prevent David Doe from constraining such as an
offense, security alertness program attached with regular
enterprise-wide security testing is also an
important step. In case of a real attack, simulating of an actual
attack in an all-inclusive approach will significantly help the
company to have a better idea to a possible
defense.
References
Jin, C., Valizadeh, S., & van Dijk, M. (2018, May).
Snapshotter: Lightweight intrusion detection and prevention
system for industrial control systems. In 2018
IEEE Industrial Cyber-Physical Systems (ICPS) (pp. 824-829).
IEEE. Heembrock, M. (2015). The risks of wearable tech in the
workplace. Risk Management, 62(1), 10. Ho,
S. M., & Hollister, J. M. (2015). Cyber insider threat in virtual
organizations. In Encyclopedia of Information Science and
Technology, Third Edition (pp. 1517-1525).
IGI Global. Retrieved from;
https://www.youtube.com/watch?v=8b9fYVG1FuY
1 2
3
4
5
4
6
5
7
7
4
5
7
7
8 8
9
1
Student paper
Foundations Date of Submission:
Original source
Date of Submission
2
Student paper
08/20//2019
Original source
2019.08.16
3
Student paper
The steps ought to have been taken in
detecting Industrial Espionage Alleged by
David Doe
Original source
Steps should have been taken to detect
the David’s alleged industrial espionage
4
Student paper
David Doe was a network administrator
for the ABC company.
Original source
David Doe is a network administrator for
the ABC Company
5
Student paper
First, it should evaluate threat and risk
data as well as log data from numerous
sources, intending to acquire information
about security that would enhance
instant response to security incidents.
Original source
Evaluation of log data as well as threat
and risk data from a number of sources,
with an intension to obtain tangible
security information that enable instant
response to security incidents
writemyclassessay 70%
Student paper 76%
Student paper 84%
Student paper 65%
Student paper 81%
writemyclassessay 65%
Student paper 82%
Student paper 68%
Student paper 81%
Student paper 100%
Student paper 100%
Student paper 100%
4
Student paper
An instance is when David is unhappy
since he is passed over for promotion
three times.
Original source
David is passed over for promotion three
times
6
Student paper
Advanced Cyber Intrusion Detection
enhance this. To enable immediate
response as soon as the alerts of faults,
attacks, or misuse indications, there
should be a correlation, analysis, and
collection of server clients’ logs.
Original source
This is enhanced by Advanced Cyber
Intrusion Detection There should be
correlation, analysis and collection of
sever clients logs that enable immediate
response as soon as the alerts of errors,
misuse or attacks shows
5
Student paper
For the integrity of local systems, it is
essential to ensure regular checks.
Original source
Regular checks to ensure integrity of
local systems
7
Student paper
This involves an outline of possible
security liabilities in software and
operating systems applications.
Original source
It involves a 360-degree outline of
possible security susceptibilities in
application software and operating
systems
7
Student paper
Conservative security actions to formerly
undiscovered detection of radical
malware, which includes advanced email
threat detection and advanced adamant
systems. To lessen compliance risks
through the utilization of Software
Compliance, they should consist of
automatic check compliance guidelines
and the instant reporting of breaches.
Original source
Detection of radical malware formerly
undiscovered by conservative security
actions, which includes advanced
insistent threat systems and advanced
email threat detection Involuntary
checking of compliance guidelines and
the instant reporting of breaches to
lessen compliance risks through the use
of Software Compliance (Winkler, 2007)
4
Student paper
Steps ought to be taken to prevent David
Doe Perpetrating Such an Offense
Original source
What steps might have been taken to
prevent his perpetrating such an offense
5
Student paper
The first step is to become aware of any
alleged industrial espionage is through
identifying information that might
critically affect the company is mislaid to
the public.
Original source
Identifying information that might
critically affect the company is lost to the
public is the first step to detect any
alleged industrial espionage
7
Student paper
This enhances them to provide control
and protection of any individual who has
access to the company’s information.
Original source
This will enable them to control and
protect any person who has the
company’s access to information
7
Student paper
To prevent David Doe from constraining
such as an offense, security alertness
program attached with regular
enterprise-wide security testing is also an
important step. In case of a real attack,
simulating of an actual attack in an all-
inclusive approach will significantly help
the company to have a better idea to a
possible defense.
Original source
Security alertness program attached with
systematic enterprise-wide security
testing is also an important step to
prevent David committing such an
offense Simulating an actual attack in a
holistic approach will help the company
to have a better idea of the possible
defenses in case of a real attack
(Androulidakis, 2016)
8
Student paper
Jin, C., Valizadeh, S., & van Dijk, M.
Original source
Jin, C., Valizadeh, S., & van Dijk, M
8
Student paper
Lightweight intrusion detection and
prevention system for industrial control
systems. In 2018 IEEE Industrial Cyber-
Physical Systems (ICPS) (pp.
Original source
Lightweight intrusion detection and
prevention system for industrial control
systems In 2018 IEEE Industrial Cyber-
Physical Systems (ICPS) (pp
9
Student paper
In Encyclopedia of Information Science
and Technology, Third Edition (pp.
Original source
In Encyclopedia of Information Science
and Technology, Third Edition (pp

More Related Content

Similar to 3895SafeAssign Originality ReportComputer Sec.docx

What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-EraJK Tech
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Why network based security
Why network based securityWhy network based security
Why network based securityAlan Rudd
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printjames morris
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxjaggernaoma
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEMJoseph DeFever
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals211 Check
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 

Similar to 3895SafeAssign Originality ReportComputer Sec.docx (20)

What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Why network based security
Why network based securityWhy network based security
Why network based security
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 

More from lorainedeserre

4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docxlorainedeserre
 
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
 
38 u December 2017 January 2018The authorities beli.docx
38  u   December 2017  January 2018The authorities beli.docx38  u   December 2017  January 2018The authorities beli.docx
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
 
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
 
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
 
3Moral Identity Codes of Ethics and Institutional Ethics .docx
3Moral Identity Codes of  Ethics and Institutional  Ethics .docx3Moral Identity Codes of  Ethics and Institutional  Ethics .docx
3Moral Identity Codes of Ethics and Institutional Ethics .docxlorainedeserre
 
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
 
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docxlorainedeserre
 
3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
 
3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
 
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docxlorainedeserre
 
3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docxlorainedeserre
 
3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docxlorainedeserre
 
3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docxlorainedeserre
 
3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docxlorainedeserre
 
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docxlorainedeserre
 
392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docxlorainedeserre
 
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docxlorainedeserre
 
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docxlorainedeserre
 
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docxlorainedeserre
 

More from lorainedeserre (20)

4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
4 Shaping and Sustaining Change Ryan McVayPhotodiscThink.docx
 
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docx
 
38 u December 2017 January 2018The authorities beli.docx
38  u   December 2017  January 2018The authorities beli.docx38  u   December 2017  January 2018The authorities beli.docx
38 u December 2017 January 2018The authorities beli.docx
 
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docx
 
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docx
 
3Moral Identity Codes of Ethics and Institutional Ethics .docx
3Moral Identity Codes of  Ethics and Institutional  Ethics .docx3Moral Identity Codes of  Ethics and Institutional  Ethics .docx
3Moral Identity Codes of Ethics and Institutional Ethics .docx
 
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx3NIMH Opinion or FactThe National Institute of Mental Healt.docx
3NIMH Opinion or FactThe National Institute of Mental Healt.docx
 
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
4.1Updated April-09Lecture NotesChapter 4Enterpr.docx
 
3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx3Type your name hereType your three-letter and -number cours.docx
3Type your name hereType your three-letter and -number cours.docx
 
3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx3Welcome to Writing at Work! After you have completed.docx
3Welcome to Writing at Work! After you have completed.docx
 
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docx
 
3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx3Big Data Analyst QuestionnaireWithin this document are fo.docx
3Big Data Analyst QuestionnaireWithin this document are fo.docx
 
3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx3HR StrategiesKey concepts and termsHigh commitment .docx
3HR StrategiesKey concepts and termsHigh commitment .docx
 
3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx3Implementing ChangeConstruction workers on scaffolding..docx
3Implementing ChangeConstruction workers on scaffolding..docx
 
3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx3Assignment Three Purpose of the study and Research Questions.docx
3Assignment Three Purpose of the study and Research Questions.docx
 
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docx
 
392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx392Group Development JupiterimagesStockbyteThinkstoc.docx
392Group Development JupiterimagesStockbyteThinkstoc.docx
 
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx39Chapter 7Theories of TeachingIntroductionTheories of l.docx
39Chapter 7Theories of TeachingIntroductionTheories of l.docx
 
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx3902     wileyonlinelibrary.comjournalmec Molecular Ecology.docx
3902    wileyonlinelibrary.comjournalmec Molecular Ecology.docx
 
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
38  Monthly Labor Review  •  June 2012TelecommutingThe.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

3895SafeAssign Originality ReportComputer Sec.docx

  • 1. %38 %9 %5 SafeAssign Originality Report Computer Security: Foundations - 201950 - CRN163 - Zavgren • Week Eight Assignment %51Total Score: High riskSanthosh Muthyapu Submission UUID: febbc9ef-e6b9-70f0-6bf0-fe171274dcc9 Total Number of Reports 1 Highest Match 51 % Santhosh Muthyapu week 8.docx Average Match 51 % Submitted on 08/20/19 10:16 AM EDT Average Word Count 666
  • 2. Highest: Santhosh Muthyapu week 8.docx %51Attachment 1 Institutional database (4) Student paper Student paper Student paper Student paper Global database (3) Student paper Student paper Student paper Internet (2) writemyclassessay atlatszo Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 666 Santhosh Muthyapu week 8.docx 7 5 6 3 8 9 1 4 2 7 Student paper 5 Student paper 8 Student paper
  • 3. https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport?attemptId=2118e265- 8842-4fba-87df- 67e2234daca3&course_id=_44439_1&download=true&includeD eleted=true&print=true&force=true Source Matches (17) Student paper 77% atlatszo 63% Student paper 62% writemyclassessay 94% Student paper 68% Running Head: INDUSTRIAL ESPIONAGE ALLEGED BY DAVID 1 INDUSTRIAL ESPIONAGE ALLEGED BY DAVID DOE 2 INDUSTRIAL ESPIONAGE ALLEGED BY DAVID Name: Santhosh Muthyapu Course: Computer Security: Foundations Date of Submission: 08/20//2019 The steps ought to have been taken in detecting Industrial Espionage Alleged by David Doe David Doe was a network administrator for the ABC company. The ABC company ought to have taken various steps in detecting Industrial Espionage alleged by
  • 4. David Doe. First, it should evaluate threat and risk data as well as log data from numerous sources, intending to acquire information about security that would enhance instant response to security incidents. The manager should be in place to detect any warning signal. An instance is when David is unhappy since he is passed over for promotion three times. The vital warning signs that a representative may have incorporates bringing home materials having a place with the organization, being keen on things outside their duties, mainly that are related to the contender of the organization. However, David is alleged to have duplicated the company’s research after quitting the company and starting his own consulting business (Ho & Hollister, J2015) To predict risks in the network traffic, and dangerous malware, the company should install signature and behavior- based detection devices. Advanced Cyber Intrusion Detection enhance this. To enable immediate response as soon as the alerts of faults, attacks, or misuse indications, there should be a correlation, analysis, and collection of server clients’ logs. For the integrity of local systems, it is essential to ensure regular checks. It was necessary for intrusion finding (Jin & van Dijk, 2018). This involves an outline of possible security liabilities in software and operating systems applications. Use of Vulnerabilities Assessment to continually monitor all data flows. Conservative security actions to formerly undiscovered detection of radical malware, which includes advanced email threat detection and advanced adamant systems. To lessen compliance
  • 5. risks through the utilization of Software Compliance, they should consist of automatic check compliance guidelines and the instant reporting of breaches. Steps ought to be taken to prevent David Doe Perpetrating Such an Offense There are various available steps, ought to have been made to avoid possible industrial espionage. The first step is to become aware of any alleged industrial espionage is through identifying information that might critically affect the company is mislaid to the public. The manager in charge of the information security of a company should be in a position to identify the intellectual property, the residential locality of the IP, and the value of the IP. This enhances them to provide control and protection of any individual who has access to the company’s information. It is also essential to have a risk assessment; this enhances an easy identification of security vulnerabilities available to the company. The organization ought not to print appropriateness data except if they are entirely fundamental. Physical security ought to have been guaranteed by verifying every vital archive that has been printed and is secured a bureau. Duplicate verification innovation ought to be contributed to evade touchy data to be replicated. Another technique is avoiding PC secret activities by utilization of infections and Trojan ponies (Heembrock, 2015). To prevent David Doe from constraining such as an offense, security alertness program attached with regular enterprise-wide security testing is also an important step. In case of a real attack, simulating of an actual attack in an all-inclusive approach will significantly help the
  • 6. company to have a better idea to a possible defense. References Jin, C., Valizadeh, S., & van Dijk, M. (2018, May). Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS) (pp. 824-829). IEEE. Heembrock, M. (2015). The risks of wearable tech in the workplace. Risk Management, 62(1), 10. Ho, S. M., & Hollister, J. M. (2015). Cyber insider threat in virtual organizations. In Encyclopedia of Information Science and Technology, Third Edition (pp. 1517-1525). IGI Global. Retrieved from; https://www.youtube.com/watch?v=8b9fYVG1FuY 1 2 3 4 5 4 6 5 7 7
  • 7. 4 5 7 7 8 8 9 1 Student paper Foundations Date of Submission: Original source Date of Submission 2 Student paper 08/20//2019 Original source 2019.08.16 3 Student paper
  • 8. The steps ought to have been taken in detecting Industrial Espionage Alleged by David Doe Original source Steps should have been taken to detect the David’s alleged industrial espionage 4 Student paper David Doe was a network administrator for the ABC company. Original source David Doe is a network administrator for the ABC Company 5 Student paper First, it should evaluate threat and risk data as well as log data from numerous sources, intending to acquire information about security that would enhance instant response to security incidents. Original source Evaluation of log data as well as threat and risk data from a number of sources,
  • 9. with an intension to obtain tangible security information that enable instant response to security incidents writemyclassessay 70% Student paper 76% Student paper 84% Student paper 65% Student paper 81% writemyclassessay 65% Student paper 82% Student paper 68% Student paper 81% Student paper 100% Student paper 100% Student paper 100% 4 Student paper An instance is when David is unhappy since he is passed over for promotion
  • 10. three times. Original source David is passed over for promotion three times 6 Student paper Advanced Cyber Intrusion Detection enhance this. To enable immediate response as soon as the alerts of faults, attacks, or misuse indications, there should be a correlation, analysis, and collection of server clients’ logs. Original source This is enhanced by Advanced Cyber Intrusion Detection There should be correlation, analysis and collection of sever clients logs that enable immediate response as soon as the alerts of errors, misuse or attacks shows 5 Student paper For the integrity of local systems, it is essential to ensure regular checks. Original source
  • 11. Regular checks to ensure integrity of local systems 7 Student paper This involves an outline of possible security liabilities in software and operating systems applications. Original source It involves a 360-degree outline of possible security susceptibilities in application software and operating systems 7 Student paper Conservative security actions to formerly undiscovered detection of radical malware, which includes advanced email threat detection and advanced adamant systems. To lessen compliance risks through the utilization of Software Compliance, they should consist of automatic check compliance guidelines and the instant reporting of breaches. Original source Detection of radical malware formerly undiscovered by conservative security
  • 12. actions, which includes advanced insistent threat systems and advanced email threat detection Involuntary checking of compliance guidelines and the instant reporting of breaches to lessen compliance risks through the use of Software Compliance (Winkler, 2007) 4 Student paper Steps ought to be taken to prevent David Doe Perpetrating Such an Offense Original source What steps might have been taken to prevent his perpetrating such an offense 5 Student paper The first step is to become aware of any alleged industrial espionage is through identifying information that might critically affect the company is mislaid to the public. Original source Identifying information that might critically affect the company is lost to the public is the first step to detect any alleged industrial espionage
  • 13. 7 Student paper This enhances them to provide control and protection of any individual who has access to the company’s information. Original source This will enable them to control and protect any person who has the company’s access to information 7 Student paper To prevent David Doe from constraining such as an offense, security alertness program attached with regular enterprise-wide security testing is also an important step. In case of a real attack, simulating of an actual attack in an all- inclusive approach will significantly help the company to have a better idea to a possible defense. Original source Security alertness program attached with systematic enterprise-wide security testing is also an important step to prevent David committing such an offense Simulating an actual attack in a
  • 14. holistic approach will help the company to have a better idea of the possible defenses in case of a real attack (Androulidakis, 2016) 8 Student paper Jin, C., Valizadeh, S., & van Dijk, M. Original source Jin, C., Valizadeh, S., & van Dijk, M 8 Student paper Lightweight intrusion detection and prevention system for industrial control systems. In 2018 IEEE Industrial Cyber- Physical Systems (ICPS) (pp. Original source Lightweight intrusion detection and prevention system for industrial control systems In 2018 IEEE Industrial Cyber- Physical Systems (ICPS) (pp 9 Student paper In Encyclopedia of Information Science
  • 15. and Technology, Third Edition (pp. Original source In Encyclopedia of Information Science and Technology, Third Edition (pp