After reading this chapter and completing the exercises, you will be able to do the following:
• Know what is meant by industrial espionage
• Understand the low-technology methods used to attempt industrial espionage
• Be aware of how spyware is used in espionage
• Know how to protect a system from espionage
When you hear the word espionage, perhaps you conjure up a number of exciting and glamorous images. Perhaps you have visions of a well-dressed man who drinks martinis, shaken but not stirred, traveling to glamorous locations with equally glamorous travel companions. Or perhaps you envision some exciting covert operation with high-speed car chases and guns blazing ...