CH-7 Industrial Espionage Flashcards
(3) More methods to protect against Industrial Espionage
■Require employees with access to sensitive information to sign a non disclosure agreement (NDA)
■Encrypt hard drives of portable computers
■Invest in Data Loss Prevention technology
■Encrypt hard drives of portable computers
–BitLocker is built into Windows
–FileVault is built into Mac OS
■Verify claims related to college degrees and certifications
High(er) Tech Espionage. Describe it.
■Monitoring software
–Spyware
–Keystroke loggers
–Capturing screenshots
■Not technically espionage, but DoS attacks can be used to:
–Prevent competitors from using its own data
–Cause service outages or failed product launches
How to protect against Industrial Espionage?
■Employ antispyware software
■Use firewalls and intrusion detection systems
■Implement security policies and ensure staff understand them
■Encrypt all transmissions
■Invest in security awareness training
■Limit portable storage media and cell phones
More methods to protect against Industrial Espionage
■Apply the principle of least privilege for granting access
■Ensure no one person controls all data at one time
■No documents/media leave the building
■Conduct employee background checks
■Scan PCs of departing employees
■Lock up tape backups, documents, and other media
The Goal of Espionage
■Collecting information
■Without target’s knowledge
■Without publicity
■To achieve an advantage