YasirsPost.docx

Here we are, the last week of class, and for some, the last week of school, including myself.  For this week’s discussion, we summarize and analyze a business espionage case and create a security plan or a mitigation method to defuse the espionage act.
For this week, the case I decided to discuss took the FBI eleven years to uncover due to multiple factors, which I will discuss later. The two perpetrators in the case I am discussing hid their actions, such as intellectual property theft, extortion, computer fraud, and other crimes they committed on behalf of China. Li Xiaoyu and Dong Jiazhi worked for the Chinese Ministry of State Security, the equivalent of the CIA, for eleven years collecting intelligence, stealing intellectual property, and committing fraud. Both perpetrators hid their activities until they decided to penetrate the Department of Energy’s site to collect information and penetrate the IT network. They collected information that can cause enormous damage, such as admin accounts, usernames, and passwords from 2009 until 2020.
The due received training on hacking computer systems, stealing and transferring information, and extortion. Xiaoyu and Jiazhi extended their activities to the US and other countries, including Germany, the UK, Japan, and many other countries.  To accomplish their mission, the perpetrators evaded detection and collecting information by encrypting the data they stole in a RAR file format, exploited vulnerabilities in software, and targeted insecure configurations in applications.
In this case, Xiaoyu and Jiazhi are trained well on their tasks. They knew what information to steal, how to exploit vulnerabilities, and how to transfer information without detection. To mitigate the risk of a threat like the threat Xiaoyu and Jiazhi poses, security professional needs to implement physical access control measures and logical access control measures to prevent unauthorized access to the network and secured areas. Additionally, restricting access to information and conducting background checks before granting access to information play a role in such a case. While restricting access, physically and logically, to information mitigate some of the risks, it does not mitigate all the risks. Another way to mitigate the risk of exploiting software and applications is to ensure the InfoSec team and detection team is scanning for such vulnerabilities before releasing these applications and to fix the vulnerabilities as soon as they find out about them.
 
References

FBI Uncovers 11 Years of Chinese Economic Espionage

https://www.justice.gov/opa/pr/two-chinese-hackers-working-ministry-state-security-charged-global-computer-intrusion

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY