Chapter 7. Industrial Espionage in Cyberspace
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Understand what is meant by industrial espionage
Understand the low-technology methods used to attempt industrial espionage
Be aware of how spyware is used in espionage
Know how to protect a system from espionage
Introduction
When you hear the word espionage, perhaps you conjure up a number of exciting and glamorous images. Perhaps you have visions of a well-dressed man who drinks martinis, shaken but not stirred, traveling to glamorous locations with equally glamorous travel companions. Or perhaps you envision some exciting covert operation with high-speed car chases and guns blazing ...
Get Computer Security Fundamentals, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.