Computer foundations

 

  Consider this hypothetical situation:  

David Doe is a network administrator for the ABC Company. David is  passed over for promotion three times. He is quite vocal in his  dissatisfaction with this situation. In fact, he begins to express  negative opinions about the organization in general. Eventually, David  quits and begins his own consulting business. Six months after Davids  departure, it is discovered that a good deal of the ABC Companys  research has suddenly been duplicated by a competitor. Executives at ABC  suspect that David Doe has done some consulting work for this  competitor and may have passed on sensitive data. However, in the  interim since David left, his computer has been formatted and reassigned  to another person. ABC has no evidence that David Doe did anything  wrong.  

  What steps might have been taken to detect Davids alleged industrial espionage?  

  What steps might have been taken to prevent his perpetrating such an offense?  

  Write your answer using a WORD document.