Discuss some of the criminal intelligence tactics used by business to thwart security issues within an institution. What are the different methods used in detecting breaches in security through intelligence?
Upon completion of this unit, students should be able to:
1. Evaluate security problems within private and public institutions and cultivate applicable security measures.
2. Analyze contemporary security investigation tactics.
3. Examine intellectual property and security measures taken to protect business intelligence and proprietary information.