1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Industrial Espionage
Spying to find out valuable information about a competitors projects, client lists and research data
Data has Value
-Resources spent to create and analyze it
-intrinsic Value
Asset Identification
Identify the most valuable data in your organization
Low-tech Method
-Employees take the data
-Usage of social engineering
Technology Oriented Method
-Spyware
-Keyloggers
-Capturing Screens
Stuxnet
A malicious computer worm that targets supervisory control data acquisition systems