Computer foundations:
Computer foundations:
Required Readings
Read Chapter 7 of the Easttom text, Industrial Espionage in Cyberspace
Primary topics:
Information as an Asset
Real-World Examples of Industrial Espionage
Steganography
Phone Taps and Bugs
Spear Phishing
Week Eight Assignment
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three
times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative
opinions about the organization in general. Eventually, David quits and begins his own consulting
business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s
research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has
done some consulting work for this competitor and may have passed on sensitive data. However, in the
interim since David left, his computer has been formatted and reassigned to another person. ABC has no
evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign
score. Score must be less than 25 for full credit.
You have three attempts.
Database security :
Required Readings
Chapter 4 of the text: Auditing Database Activity
http://www.oracle.com/technetwork/products/audit-vault/learnmore/twp-security-auditperformance-
166655.pdf
https://searchsecurity.techtarget.com/IT-security-auditing-Best-practices-for-conducting-audits
Required Videos
MySQL Audit Log Monitoring
Tips for Database Audit Assessment
Continuous Auditing/Monitoring
Week 8 Paper
Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c.
Why did Oracle consider them necessary? What problems do they solve? How do they benefit
companies?
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with
quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available
from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the
words) in quotation marks and cite in-line (as all work copied from another should be handled). The
quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do
not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution
(quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the
instructions regarding length of your submission Do not use spinbot or other word replacement software.
Proof read your work or have it edited. Find something interesting and/or relevant to your work to write
about.
Please do not submit attachments unless requested.