Limit search to available items
Book Cover
E-book
Author Koehler, Thomas R., 1968- author.

Title Understanding Cyber Risk : Protecting Your Corporate Assets
Published Florence : Taylor and Francis, 2017

Copies

Description 1 online resource (152 pages)
Contents Cover -- Title -- Copyright -- Contents -- Foreword -- 1 Espionage: an underestimated matter -- Yesterdayâ#x80;#x99;s paranoia is tomorrowâ#x80;#x99;s threat -- Digital transformation and espionage -- Security risks included -- Technical progress -- Loss is everywhere -- Why we hear so little about industrial espionage -- 2 From competition to economic warfare -- Business means war -- The great confusion of terms and definitions -- OSINT: open source intelligence -- HUMINT: human intelligence -- SIGINT: signals intelligence -- COMINT, ELINT and TECHINT
At the limits of law and ethicsCompetitive intelligence -- Espionage at the expense of companies -- Espionage as a business model -- Anyone can be affected -- 3 From old-school espionage to modern methods of attack -- The dawn of economic espionage -- The magic of silk -- The power of fire -- The broken mirror -- On the way to paper -- Russian economic development -- How porcelain came to Europe -- The secret of tea -- The beginning of the English textile industry -- The end of the rubber monopoly -- The German steam engine
As hard as Krupp steel â#x80;#x93; thanks to some help from the EnglishEspionage as an international business -- The dreaded copier -- Supersonic spies -- The fight for sovereignty in the air -- When the secret service lends a hand -- Hopefully itâ#x80;#x99;s concrete -- Gone with the wind -- Sow the wind and reap the whirlwind -- Bad employees -- A French economic development programme -- Betrayal by former employees -- The Detroit and Wolfsburg Strangler -- Bugs for everyone -- Starwood versus Hilton -- Programme code gone astray -- Sharp razors
Garbage bin archaeologyBetween garbage bins and false identities -- Unfair play -- Secret formula -- The Tour de France Trojan -- Long live sport -- Varied interests -- Perfectionist product counterfeiters -- The short route to a new design -- The senior executive and the baby monitor -- Unsafe at any speed -- The notebook in the hotel room -- A new age of industrial espionage -- 4 Economic and industrial espionage in the digital age -- Helpless victims -- The author and the Trojan Horse -- The price of support -- The trainee with the USB stick
The classic hackFor whom the sun shines -- Medium-sized companies in the sights of hackers -- The hacker and the network -- Plundered into insolvency -- Spied on and repelled -- Designed and collected -- Operation Aurora -- New hazard potentials -- Dangerous places and devices -- The return of the dreaded copier -- The curse of the good deed -- Espionage via the power plug -- The Internet café risk factor -- Public Wi-Fi -- Drones and espionage -- Mind the camera -- Smartphones as pocket bugs -- Google Glass -- Built-in risks -- Open back doors
Notes ""The attack of the hand scanner""
Print version record
Form Electronic book
ISBN 9781317005056
1317005058