Understanding cyber risk : protecting your corporate assets

Author(s)

    • Koehler, Thomas R.

Bibliographic Information

Understanding cyber risk : protecting your corporate assets

Thomas R. Koehler

(A Gower book)

Routledge, 2018

  • : hbk

Available at  / 1 libraries

Search this Book/Journal

Note

Includes bibliographical references (p. [127]-134) and index

Description and Table of Contents

Description

A myriad of security vulnerabilities in the software and hardware we use today can be exploited by an attacker, any attacker. The knowledge necessary to successfully intercept your data and voice links and bug your computers is widespread and not limited to the intelligence apparatus. Consequently, the knowledge required can - at least in part - also easily be accessed by criminals trying to 'transfer your wealth' and competitors looking for your trade secrets. The temptation to use these easily accessible resources to the disadvantage of a rival company grows as global competition gets fiercer. Corporate espionage is nothing new, but since the dawn of the Internet Age the rules have changed. It is no longer necessary to be on-site to steal proprietary information. Cyberattacks today are cheap and attackers run a very low risk of getting caught, as attacks can be executed from anywhere in the world - an ideal breeding ground for criminal activities - and the consequences can be disastrous. In Understanding Cyber Risk: Protecting your Corporate Assets the author provides a wealth of real world examples from diverse industries from all over the world on how company assets are attacked via the cyber world. The cases clearly show that every organization can fall victim to a cyberattack, regardless of the size or country of origin. He also offers specific advice on how to protect core assets and company secrets. This book is essential reading for anyone interested in cyber security, and the use of cyberattacks in corporate espionage.

Table of Contents

1. Espionage: An underestimated matter 2. From competition to economic warfare 3. From old-school espionage to modern methods of attack 4. Economic and industrial espionage in the digital age 5. En route to the "spyproof" company

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top