Critical Thinking: Project Reports

Critical Thinking: Project Reports (30 points)

Complete the following projects from your textbook:

  1. Preventing Corporate Espionage (project 7.1 at the end of Chapter 7)
    1. Using one of the websites listed in this book (you can also choose from the preferred resources in Chapter 1) or other resources, find a set of guidelines on general computer security. Write a brief essay comparing and contrasting those guidelines against the ones given in this chapter. Keep in mind that the guidelines in this chapter relate specifically to corporate espionage and not to general computer security.
  2. Handling Employees (project 7.2 at the end of Chapter 7)
    1. Write a brief essay describing steps regarding the handling of employees. Include all steps that you believe an organization should take to prevent corporate espionage. It is important that you support your opinions with sources and reasons.
      If possible, visit a company and talk with someone in either the IT or personnel departments to determine how that company handles issues such as employee termination, rotation of duties, control of access to data, and so forth. Compare and contrast your steps to those used by the company you visited.
  3. Asset Identification in your Organization (project 7.3 at the end of Chapter 7)
    1. Using the Asset Identification table found in this chapter or a similar table of your own design, identify the most valuable data in your organization (school or business) and what parties would most likely wish to access that data. Then write a brief guideline on how you might go about securing that data. In this project, you should tailor your security recommendations to the specific type of data you are trying to protect and against the most likely perpetrators of industrial espionage.


  • Your report should be six-eight pages in length, not including the title or reference pages.
  • Be sure to provide citations from your readings and additional research to support your statements.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.
  • You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

Please follow APA style guidelines

There is SafeAssign Plagiarism Checker, If your score is above 25%, you will want to edit your assignment before submitting it for grading.

course name: CS666: Information Security Legal and Ethical Issues

Course Materials Required: Easttom, W. C. (2016). Computer security fundamentals (3rd ed.). Indianapolis, IN: Pearson. ISBN: 9780789757463

What our clients say
Daphne Whitby
Daphne Whitby
My homework required that I use Java to produce a programming assignment. I’ve been running up and down with friends and workThank you for  your help 
Arnold M
Arnold M
This site did honor their end of the bargain. I have been searching for a college essay help services for a while, and finally, I found the best of the best.
Regina Smith
Regina Smith
I received my essay early this morning after I had placed an order last night. I was so amazed at how quickly they did my work. The most surprising thing is that I was not asked to pay for extra due to the short notice!! I am a happy student