نتایج جستجو برای: espionage
تعداد نتایج: 371 فیلتر نتایج به سال:
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce, education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and ...
From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...
Digital forensics experts are called on to collect and analyze digital information from electronic devices such as computer hard drives and cell phones. Electronic evidence is used in a wide variety of cases, ranging from corporate espionage to employee separation or divorce. Recent changes to the Federal Rules of Civil Procedure have legitimized the use of digital evidence in court, making thi...
On October 14, 2011, we were alerted to a sample by the Laboratory of Cryptography and System Security (CrySyS) at Budapest University of Technology and Economics. The threat appeared very similar to the Stuxnet worm from June of 2010 [1]. CrySyS named the threat Duqu [dyü-kyü] because it creates files with the file name prefix “~DQ” [2]. We confirmed Duqu is a threat nearly identical to Stuxne...
The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leak...
This paper outlines the possible recovery of potentially sensitive corporate information from residual data. It outlines previous work on the recovery of information contained on second hand hard disks and handheld devices and discusses the risk of individuals conducting industrial espionage by targeting specific organizations. It examines the possible avenues for an attacker to obtain a storag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید