Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top 250 billion annually and also costs the United States approximately 750,000 jobs. The International...

Descripción completa

Detalles Bibliográficos
Autor principal: Burgess, Christopher (-)
Otros Autores: Power, Richard
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Oxford : Syngress ; Elsevier Science [distributor] 2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627499906719
Tabla de Contenidos:
  • Front Cover; Secrets Stolen, Fortunes Lost; Copyright Page; Authors; Contents; Introduction; Part 1: The Challenge; Chapter 1: The Tale of the Targeted Trojan; Introduction; The Haephrati Case; The When; The How; The Hook; The Mechanism; The Who; The Why; The Cost; The Discovery; The Scope; Alleged Intermediary Clients; Alleged End-Recipients; Companies Identified as Victims; Related U.S./UK Advisories; UK - National Infrastructure Security Coordination Centre (NISCC); U.S. - The Department of Homeland Security (DHS)
  • Chapter 2: When Insiders and/or Competitors Target a Business's Intellectual PropertyIntroduction; Lightwave Microsystems; America Online; Casiano Communications; Corning and PicVue; Avery Dennison and Four Pillars; Lexar Media and Toshiba; SigmaTel and Citroen; 3 dGEO - China; Chapter 3: When State Entities Target a Business's Intellectual Property; Introduction; Airbus and Saudi Arabian Airlines; Russian Intelligence and Japanese Trade Secrets; Japan and the Cleveland Clinic Foundation; China and Russia: TsNIIMASH-Export; Overt Nation State Attempts: India, Venezuela, Brazil, and Others
  • Current and Future Threats to Economic SecurityChapter 4: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property; Introduction; Technology Counterfeiting; The Apparel Industry; The Entertainment Industry; Chapter 5: Virtual Roundtable on Intellectual Property and Economic Espionage; Introduction; The Legal Perspective: Naomi Fine; The OpSec Perspective: Keith Rhodes; The Professional Investigator's Perspective: Ed Stroz; The DoD Cyber Sleuth's Perspective: James Christy; The Security and Privacy Consultant's Perspective: Rebecca Herold; Part 2: The Strategy
  • Chapter 6: Elements of a Holistic ProgramIntroduction; False Memes Lead People the Wrong Way; From the Industrial Age to the Information Age; Chapter 7: Case Study: Cisco's Award-Winning Awareness Program; Introduction; What Is This Scenario?; The Message Is the Medium: Be a Security Champion; The Message; When Your Message Reaches the Employees They Become Your Messengers; Staying on Message; It Takes More Than Compelling Content and Hard Work; Lessons Learned; Chapter 8: Case Study: A Bold New Approach in Awareness and Education Meets an Ignoble Fate; Introduction
  • The Mission, the Medium, the MessageMeaningful Content and Persuasive Delivery; Investment and Empowerment; Three-Phase Approach; Phase I: Engage Everyone Economically and Effectively; Phase II: A Rising Tide Lifts All the Boats; Phase III: Deliver Vital Intelligence and Early Warning to the Executive; Don't Be Surprised If...; Chapter 9: Case Study: The Mysterious Social Engineering Attacks on Entity Y; Introduction; Fundamentals of Social Engineering Attacks; The Mysterious Social Engineering Attacks on Entity Y; Guidance for the Workforce; How to Recognize Elicitation
  • How to Handle the Caller