Complete the following:
7.1: Preventing Corporate Espionage
Using one of the websites listed in this book (CERT, Microsoft security advisor, F-Secure and SANS Institute) or you can also choose from the preferred resources, find a set of guidelines on general computer security. Write a professional essay comparing and contrasting those guidelines against the ones given in this chapter (This will be shared after the bid). Keep in mind that the guidelines in this chapter relate specifically to corporate espionage and not to general computer security.
7.2: Handling Employees
Write a brief essay describing steps regarding the handling of employees. These steps should include all steps that you believe any organization should take to prevent corporate espionage. It is important that you support your opinions with sources and reasons.
7.3: Asset Identification in Your Organization
Using the Asset Identification table below or a similar table of your own design, identify the most valuable data in your organization (school or business) and what parties would most likely wish to access that data. Then write a guideline on how you might go about securing that data.You should tailor your security recommendations to the specific type of data you are trying to protect and against the most likely perpetrators of industrial espionage.
Example of 7.3: and you can develop new one.