Industrial Espionage from Residual Data: Risks and Countermeasures
نویسندگان
چکیده
This paper outlines the possible recovery of potentially sensitive corporate information from residual data. It outlines previous work on the recovery of information contained on second hand hard disks and handheld devices and discusses the risk of individuals conducting industrial espionage by targeting specific organizations. It examines the possible avenues for an attacker to obtain a storage device, then discusses the skill level required to extract information from the storage devices and considers the potential risk to an organization from this particular avenue of attack. The paper concludes by proposing a number of possible countermeasures to enable organizations to reduce the risk of this particular form of attack.
منابع مشابه
Cyber Espionage and Illegitimate Information Retrieval
One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...
متن کاملEntry and espionage with noisy signals
We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent's actions and the potential entrant decides whether to enter based on this signal. If the precision of the Intelligence Syste...
متن کاملUse of subjective and physiological indicators of sleepiness to predict performance during a vigilance task.
Sleepiness is a major risk factor for serious injury and death in accidents. Although it is important to develop countermeasures to sleepiness to reduce risks, it is equally important to determine the most effective timing for these countermeasures. To determine optimum timing for necessary countermeasures, we must be able to predict performance errors. This study examined the predictability of...
متن کاملGuide to Industrial Control Systems (ICS) Security
This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and...
متن کاملQuantitative risk management in gas injection project: a case study from Oman oil and gas industry
The purpose of this research was to study the recognition, application and quantification of the risks associated in managing projects. In this research, the management of risks in an oil and gas project is studied and implemented within a case company in Oman. In this study, at first, the qualitative data related to risks in the project were identified through field visits and extensive interv...
متن کامل