Question 5
Scenario:
The owners of a sma ll start-up company found it stra nge when several of their programmers quit
the company at the same time. When company executives "got wind" that the individuals had
gone to work for a competitor, they began to ask questions about whether or not the company's
intellectual property had been stolen, si nce these programmers were working on key pieces of
their product. Since this was a sma ll company, the management did not have a security officer, so
they looked to the IT personnel to examine the problem and to look for evidence. The first area
the IT personnel examined was the email of the employees. Through the email, they were able
to piece together that the employees who left the company were collaborating, and they
intended to steal the code they developed at this company. These emails were key evidence that
the company saved to an external storage device for preservation. The company made a
secondary copy so that they could review the data.
(a) Identify the type of security threat demonstrated in the case study and explain why it fits that
category.
[04 Marks]
(b) What are the potential risks and consequences for the company if it fails to handle the
evidence properly or can not prove intellectual property theft?
[04 Marks]
(c) From an ethical and legal standpoint, was it appropriate for the IT team to access and review
employee e-mai ls without prior consent? Explain your reasoning.
[04 Marks]
(d) How can security analytics help the company detect or investigate this kind of insider t hreat
earlier? Explain what data or tools could be used to find susp icious activity. [04 Marks]
(e) If you were appointed as a new cybersecurity advisor for this start-up, what long-term
strategies would you implement to protect intellectual property and prevent insider attacks
in the future?
[04 Marks]
---------------- END OF EXAMINATION ----------------
3