Data loss prevention security tools

Assignment Help Basic Computer Science
Reference no: EM133233147

The CEO of Trusty Co, a fictitious company, came to you in the information security office today to inquire how his competitor Trusty Inc, another fictitious company, was able to release our secret widget before us. He wants a full report on how Inc stole his information as soon as possible.

Using the data loss prevention security tools and searching for the name of the secret widget, you were able to determine the CEO had been emailing the plans and designs to his personal email address. This was the only time the secret material was outside the control of the organization.

After interviewing the CEO, you learn that six months ago, he received a popup from a company he believed to be Microsoft on his home computer while he was working on the plans for the secret widget. The popup stated his updates had failed and gave him a phone number to call for support. He called the number and followed their instructions believing they helped him resolved the issue. From experience, you know that Microsoft doesn't operate this way, and that his home computer had been compromised while he was working on the secret widget plans.

Research the compromise to understand how it happened and how to prevent it in the future. Write a report for the CEO that describes how the data was compromised and describe the evidence you have that supports this theory. Finally summarize recommendations to the CEO how this can be prevented in the future.

Reference no: EM133233147

Questions Cloud

Discusses jihadist muslims and islamic terrorists : Thecourse textbook discusses Jihadist Muslims and Islamic Terrorists - in your own words, how would you describe the differences between the two
Identify the form of breach of contract : BLA101 Southern Business School, Identify the form of breach of contract and list the requirements for this specific form of breach of contract
What does engagement mean to you : What does "Engagement" mean to you? What types of community engagement have you been a part of? In your experience, what worked well? Why?
What was the public opinion of this case at the time : BUS 21500 Kirtland Community College, What was the public opinion of this case at the time it was brought? Were the injuries such that a lawsuit should have
Data loss prevention security tools : Using the data loss prevention security tools and searching for the name of the secret widget, you were able to determine the CEO had been emailing
Identify how the factors chosen are tied : Herzing University, identify how the factors chosen are tied to either the vision or mission of the firm or how they perform a specific task in the current
What is the bdp value : What is the BDP value or problem you are trying to solve? What is the expected output of your program?
Reflect on the role of a nurse leader as a knowledge worker : Reflect on the role of a nurse leader as a knowledge worker. Consider how knowledge may be informed by data that is collected/accessed
What are the activiteis of the bill : Evolution and history of the No surpise act bill, What are the activiteis of the bill, and who are the key players who is affected and how. Please provide

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd