Padgett-Beale’s Corporate Security Office has recently completed an investigatio

June 26, 2024

Padgett-Beale’s Corporate Security Office has recently
completed an investigation into how a competitor may have obtained copies of
the confidential architectural drawings and design plans for a new type of
resort that the company had planned for a recently acquired island property. It
is suspected that an Advanced Persistent Threat mechanism may have been used to
exfiltrate information.
In your opinion, what processes and procedures should be
used to discourage or make it difficult for employees, managers, and executives
to inadvertently misuse and/or steal the company’s intellectual property
(consider data classification and marking, separation of duties, and least
privilege).
References:
Alto, P. (n.d.). What is an Exploit Kit? Palo Alto
Networks. Retrieved June 21, 2024, from https://www.paloaltonetworks.com/cyberpedia/what-is-an-exploit-kit
Chia, A. (n.d.). Data Exfiltration: Prevention, Risks
& Best Practices. Splunk. Retrieved June 21, 2024, from https://www.splunk.com/en_us/blog/learn/data-exfiltration.html
Wolf, A. (2023, August 3). The Top 3 Cyber Attack
Vectors. Retrieved June 21, 2024, from https://arcticwolf.com/resources/blog/top-five-cyberattack-vectors/
Z. (2024, January 1). Anatomy of APT: Advanced Persistent
Threat Guide. Retrieved June 21, 2024, from https://www.zenarmor.com/docs/network-security-tutorials/what-is-advanced-persistent-threat-apt
Dilworth , M. (2023, August 31). An IP Guide for the
Corporate Legal Practitioner: IP Theft and the Major Threats to Your Client’s
IP. DILWORTH IP. Retrieved June 21, 2024, from https://www.dilworthip.com/resources/news/threats-to-intellectual-property/

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered to straight to your email.

GET HELP WITH YOUR PAPER