vovajourney.blogg.se

Use of steganography in cyber espionage
Use of steganography in cyber espionage












use of steganography in cyber espionage

Others may elect to reveal company secrets merely because they are angry about some injustice (real or imagined). Some engage in such acts for obvious financial gains. Just as with military and political espionage, the employees’ motives for divulging information vary. A corporate spy need not hack into a system in order to obtain sensitive and confidential information if an employee is willing to simply hand over the information. In fact, whether the method used is technological or not, disgruntled employees are the single greatest security risk to any organization. Disgruntled former (or current) employees can copy sensitive documents, divulge corporate strategies and plans, or perhaps reveal sensitive information.

use of steganography in cyber espionage

Low-Tech Industrial EspionageĬorporate espionage can occur without the benefit of computers or the Internet. There are also other technological methods we will discuss. The second, more technology-oriented method is for individuals to use spyware, which includes the use of cookies and key loggers. An easy, low-technology avenue would be for current or former employees to simply take the data or for someone to use social engineering methods (discussed in Chapter 3, “Cyber Stalking, Fraud, and Abuse”) to extract data from unsuspecting company employees. There are two ways that espionage can occur. Learn More Buy How Does Espionage Occur? Computer Security Fundamentals, 5th Edition














Use of steganography in cyber espionage