Documente Academic
Documente Profesional
Documente Cultură
CHAPTER 7
INDUSTRIAL ESPIONAGE IN CYBERSPACE
CHAPTER 7 OBJECTIVES
When students finish reading this chapter, they will be able to:
CHAPTER OVERVIEW
Industrial espionage is a real and growing problem. Company economic goals are
frequently dependent on accurate and often sensitive data. With billions of dollars at stake,
private companies may become engaged in industrial espionage. It can be difficult to
accurately assess just how great a problem it is. For obvious reasons, companies that
perpetrate corporate espionage do not share that they do it, and companies that are victims
of such espionage often do not want to reveal that fact. To protect yourself and your
company, students must learn about espionage methods and safeguards. In the exercises
at the end of this chapter, students run antispyware, key loggers, and screen capture
software to become familiar with how they work.
The major sections in this chapter are
1. What Is Industrial Espionage? This section describes industrial espionage and why it is an IT security
problem.
2. Information as an Asset. This section describes how to determine the value of your data.
3. How Does Espionage Occur? High- and low-tech methods for the collection of corporate data are covered.
4. Protecting Against Industrial Espionage. Eleven ways to protect your company from espionage are
described.
5. Real-World Examples of Industrial Espionage. Five examples of real-world espionage are used.
II. Introduction
Spear Phishing
VIII. Summary
X. Exercises
XI. Projects
dumpster diving The process to search through trash looking for information that might
be useful in hacking (particularly social engineering) or identity theft.
encryption The act to encrypt a message. This usually involves altering a message so
that it cannot be read without the key and the decryption algorithm.