In many cases, computer crimes do not involve attacks in the popular sense. Most administrators tend to think of system attacks originating with someone gaining access to a system by breaching outside fortifications. The truth of the matter is that most successful attacks are "inside jobs." The exact numbers depend on the survey or data, but they all state that the most successful and devastating attacks originate within the target organization. Employees, contractors, and former employees use their knowledge of the employer's systems to gain unauthorized access and wreak havoc. Often these acts include theft or denial-of-service attacks, destruction or modification of sensitive data, trafficking in software piracy, and theft of trade secrets and intellectual property. Following is a list of terms with which you should be familiar:
- Espionage
- Collection and analysis of illicitly obtained information.
- Trade secret
- Plan, concept, prototype, information, or property that has value by providing a business advantage over competitors who do not have the secret.
- Corporate espionage
- Theft of trade secrets for economic gain.
- Intellectual property
- Any product of the human intellect that is unique or novel, having some value in the marketplace. Patent, copyright, trademark, service mark, or trade secret protects intellectual property.
- Cyber terrorism
- Unlawful use of force against persons or property to intimidate a government or a civilian population in furtherance of political or social objectives. Acts of terrorism usually have the goal of disrupting the public's faith in their institutions.
- Economic espionage
- Illicit collection of information, sponsored by a foreign government for economic advantage.
0 comments:
Post a Comment