Write a 2 page briefing paper in which you present a summary of the issues  

Write a 2 page briefing paper in which you present a summary of the issues

CSIA 300 Case Study #3 Intellectual Property Threat Analysis

Write a 2 page briefing paper in which you present a summary of the issues (including a description of the types of intellectual property which may have been stolen). You should then summarize your research into insider theft of intellectual property and your recommendations as to how the company should respond to the incident (including response to the current incident and detection and prevention strategies for the future). Be choosy about what you include – a busy executive or manager does not want to read lengthy, rambling reports. Don’t be too choosy however. Your recommended content should be comprehensive and fully address the security and privacy issues related to theft of intellectual property by insiders.

At a minimum, your briefing paper for this case study must include the following:

1.An introduction to the case scenario and the topic (use the information above and from the corporate history / industry overview).

2.An analysis of the security and privacy issues that includes five or more key points about the topic (“intellectual property theft by insiders”).

3.Recommendations for 5 or more best practice based actions that managers and employees should take to address the identified security and privacy issues. Include at least one recommendation for a technology based solution. Include at least one recommendation for a policy based solution as well. Solutions that you suggested for Case Study #2 may work here as well but, you should include at least two new solutions that are unique to intellectual property and/or insider threats.

4.A closing section in which you restate the key issues and your recommendations.

csia_300_case_study__3_intellectual_property_threat_analysis_v2 16csia_300_padgett_beale_corporate_profile_v1


Solution preview

The term intellectual property means something which is a creation of the mind. For instance, one may make a company logo, a technological invention, or a piece of art. After making the aforementioned things they should not be reproduced or used without the knowledge or permission of the original owner (Moore et al., 2011). There are different types of intellectual property theft which primarily depend…………………………….


933 words