%38
%9
%5
SafeAssign Originality Report
Computer Security: Foundations - 201950 - CRN163 - Zavgren • Week Eight Assignment
%51Total Score: High riskSanthosh Muthyapu
Submission UUID: febbc9ef-e6b9-70f0-6bf0-fe171274dcc9
Total Number of Reports
1
Highest Match
51 %
Santhosh Muthyapu week 8.docx
Average Match
51 %
Submitted on
08/20/19
10:16 AM EDT
Average Word Count
666
Highest: Santhosh Muthyapu week 8.docx
%51Attachment 1
Institutional database (4)
Student paper Student paper Student paper
Student paper
Global database (3)
Student paper Student paper Student paper
Internet (2)
writemyclassessay atlatszo
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 666
Santhosh Muthyapu week 8.docx
7 5 6
3
8 9 1
4 2
7 Student paper 5 Student paper 8 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=2118e265-8842-4fba-87df-67e2234daca3&course_id=_44439_1&download=true&includeDeleted=true&print=true&force=true
Source Matches (17)
Student paper 77%
atlatszo 63%
Student paper 62%
writemyclassessay 94%
Student paper 68%
Running Head: INDUSTRIAL ESPIONAGE ALLEGED BY DAVID 1
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID DOE 2
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID Name: Santhosh Muthyapu Course: Computer Security: Foundations Date of Submission: 08/20//2019
The steps ought to have been taken in detecting Industrial Espionage Alleged by David Doe
David Doe was a network administrator for the ABC company. The ABC company ought to have taken various steps in detecting Industrial Espionage alleged by
David Doe. First, it should evaluate threat and risk data as well as log data from numerous sources, intending to acquire information about security that would
enhance instant response to security incidents. The manager should be in place to detect any warning signal. An instance is when David is unhappy since he is
passed over for promotion three times. The vital warning signs that a representative may have incorporates bringing home materials having a place with the
organization, being keen on things outside their duties, mainly that are related to the contender of the organization. However, David is alleged to have duplicated the
company’s research after quitting the company and starting his own consulting business (Ho & Hollister, J2015) To predict risks in the network traffic, and dangerous
malware, the company should install signature and behavior-based detection devices. Advanced Cyber Intrusion Detection enhance this. To enable immediate
response as soon as the alerts of faults, attacks, or misuse indications, there should be a correlation, analysis, and collection of server clients’ logs. For the
integrity of local systems, it is essential to ensure regular checks. It was necessary for intrusion finding (Jin & van Dijk, 2018). This involves an outline of possible
security liabilities in software and operating systems applications. Us ...
1. %38
%9
%5
SafeAssign Originality Report
Computer Security: Foundations - 201950 - CRN163 - Zavgren •
Week Eight Assignment
%51Total Score: High riskSanthosh Muthyapu
Submission UUID: febbc9ef-e6b9-70f0-6bf0-fe171274dcc9
Total Number of Reports
1
Highest Match
51 %
Santhosh Muthyapu week 8.docx
Average Match
51 %
Submitted on
08/20/19
10:16 AM EDT
Average Word Count
666
2. Highest: Santhosh Muthyapu week 8.docx
%51Attachment 1
Institutional database (4)
Student paper Student paper Student paper
Student paper
Global database (3)
Student paper Student paper Student paper
Internet (2)
writemyclassessay atlatszo
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 666
Santhosh Muthyapu week 8.docx
7 5 6
3
8 9 1
4 2
7 Student paper 5 Student paper 8 Student paper
4. David Doe. First, it should evaluate threat and risk data as well
as log data from numerous sources, intending to acquire
information about security that would
enhance instant response to security incidents. The manager
should be in place to detect any warning signal. An instance is
when David is unhappy since he is
passed over for promotion three times. The vital warning signs
that a representative may have incorporates bringing home
materials having a place with the
organization, being keen on things outside their duties, mainly
that are related to the contender of the organization. However,
David is alleged to have duplicated the
company’s research after quitting the company and starting his
own consulting business (Ho & Hollister, J2015) To predict
risks in the network traffic, and dangerous
malware, the company should install signature and behavior-
based detection devices. Advanced Cyber Intrusion Detection
enhance this. To enable immediate
response as soon as the alerts of faults, attacks, or misuse
indications, there should be a correlation, analysis, and
collection of server clients’ logs. For the
integrity of local systems, it is essential to ensure regular
checks. It was necessary for intrusion finding (Jin & van Dijk,
2018). This involves an outline of possible
security liabilities in software and operating systems
applications. Use of Vulnerabilities Assessment to continually
monitor all data flows. Conservative security
actions to formerly undiscovered detection of radical malware,
which includes advanced email threat detection and advanced
adamant systems. To lessen compliance
5. risks through the utilization of Software Compliance, they
should consist of automatic check compliance guidelines and
the instant reporting of breaches. Steps
ought to be taken to prevent David Doe Perpetrating Such an
Offense
There are various available steps, ought to have been made to
avoid possible industrial espionage. The first step is to become
aware of any alleged industrial
espionage is through identifying information that might
critically affect the company is mislaid to the public. The
manager in charge of the information security of a
company should be in a position to identify the intellectual
property, the residential locality of the IP, and the value of the
IP. This enhances them to provide
control and protection of any individual who has access to the
company’s information. It is also essential to have a risk
assessment; this enhances an easy
identification of security vulnerabilities available to the
company. The organization ought not to print appropriateness
data except if they are entirely fundamental.
Physical security ought to have been guaranteed by verifying
every vital archive that has been printed and is secured a
bureau. Duplicate verification innovation ought
to be contributed to evade touchy data to be replicated. Another
technique is avoiding PC secret activities by utilization of
infections and Trojan ponies (Heembrock,
2015). To prevent David Doe from constraining such as an
offense, security alertness program attached with regular
enterprise-wide security testing is also an
important step. In case of a real attack, simulating of an actual
attack in an all-inclusive approach will significantly help the
6. company to have a better idea to a possible
defense.
References
Jin, C., Valizadeh, S., & van Dijk, M. (2018, May).
Snapshotter: Lightweight intrusion detection and prevention
system for industrial control systems. In 2018
IEEE Industrial Cyber-Physical Systems (ICPS) (pp. 824-829).
IEEE. Heembrock, M. (2015). The risks of wearable tech in the
workplace. Risk Management, 62(1), 10. Ho,
S. M., & Hollister, J. M. (2015). Cyber insider threat in virtual
organizations. In Encyclopedia of Information Science and
Technology, Third Edition (pp. 1517-1525).
IGI Global. Retrieved from;
https://www.youtube.com/watch?v=8b9fYVG1FuY
1 2
3
4
5
4
6
5
7
7
7. 4
5
7
7
8 8
9
1
Student paper
Foundations Date of Submission:
Original source
Date of Submission
2
Student paper
08/20//2019
Original source
2019.08.16
3
Student paper
8. The steps ought to have been taken in
detecting Industrial Espionage Alleged by
David Doe
Original source
Steps should have been taken to detect
the David’s alleged industrial espionage
4
Student paper
David Doe was a network administrator
for the ABC company.
Original source
David Doe is a network administrator for
the ABC Company
5
Student paper
First, it should evaluate threat and risk
data as well as log data from numerous
sources, intending to acquire information
about security that would enhance
instant response to security incidents.
Original source
Evaluation of log data as well as threat
and risk data from a number of sources,
9. with an intension to obtain tangible
security information that enable instant
response to security incidents
writemyclassessay 70%
Student paper 76%
Student paper 84%
Student paper 65%
Student paper 81%
writemyclassessay 65%
Student paper 82%
Student paper 68%
Student paper 81%
Student paper 100%
Student paper 100%
Student paper 100%
4
Student paper
An instance is when David is unhappy
since he is passed over for promotion
10. three times.
Original source
David is passed over for promotion three
times
6
Student paper
Advanced Cyber Intrusion Detection
enhance this. To enable immediate
response as soon as the alerts of faults,
attacks, or misuse indications, there
should be a correlation, analysis, and
collection of server clients’ logs.
Original source
This is enhanced by Advanced Cyber
Intrusion Detection There should be
correlation, analysis and collection of
sever clients logs that enable immediate
response as soon as the alerts of errors,
misuse or attacks shows
5
Student paper
For the integrity of local systems, it is
essential to ensure regular checks.
Original source
11. Regular checks to ensure integrity of
local systems
7
Student paper
This involves an outline of possible
security liabilities in software and
operating systems applications.
Original source
It involves a 360-degree outline of
possible security susceptibilities in
application software and operating
systems
7
Student paper
Conservative security actions to formerly
undiscovered detection of radical
malware, which includes advanced email
threat detection and advanced adamant
systems. To lessen compliance risks
through the utilization of Software
Compliance, they should consist of
automatic check compliance guidelines
and the instant reporting of breaches.
Original source
Detection of radical malware formerly
undiscovered by conservative security
12. actions, which includes advanced
insistent threat systems and advanced
email threat detection Involuntary
checking of compliance guidelines and
the instant reporting of breaches to
lessen compliance risks through the use
of Software Compliance (Winkler, 2007)
4
Student paper
Steps ought to be taken to prevent David
Doe Perpetrating Such an Offense
Original source
What steps might have been taken to
prevent his perpetrating such an offense
5
Student paper
The first step is to become aware of any
alleged industrial espionage is through
identifying information that might
critically affect the company is mislaid to
the public.
Original source
Identifying information that might
critically affect the company is lost to the
public is the first step to detect any
alleged industrial espionage
13. 7
Student paper
This enhances them to provide control
and protection of any individual who has
access to the company’s information.
Original source
This will enable them to control and
protect any person who has the
company’s access to information
7
Student paper
To prevent David Doe from constraining
such as an offense, security alertness
program attached with regular
enterprise-wide security testing is also an
important step. In case of a real attack,
simulating of an actual attack in an all-
inclusive approach will significantly help
the company to have a better idea to a
possible defense.
Original source
Security alertness program attached with
systematic enterprise-wide security
testing is also an important step to
prevent David committing such an
offense Simulating an actual attack in a
14. holistic approach will help the company
to have a better idea of the possible
defenses in case of a real attack
(Androulidakis, 2016)
8
Student paper
Jin, C., Valizadeh, S., & van Dijk, M.
Original source
Jin, C., Valizadeh, S., & van Dijk, M
8
Student paper
Lightweight intrusion detection and
prevention system for industrial control
systems. In 2018 IEEE Industrial Cyber-
Physical Systems (ICPS) (pp.
Original source
Lightweight intrusion detection and
prevention system for industrial control
systems In 2018 IEEE Industrial Cyber-
Physical Systems (ICPS) (pp
9
Student paper
In Encyclopedia of Information Science
15. and Technology, Third Edition (pp.
Original source
In Encyclopedia of Information Science
and Technology, Third Edition (pp