Home Page Icon
Home Page
Table of Contents for
Part 1: Understanding the Problem of Business Espionage
Close
Part 1: Understanding the Problem of Business Espionage
by Bruce Wimmer, CPP
Business Espionage
Cover image
Title page
Table of Contents
Copyright
Dedication
Author Biography
Introduction
Business espionage misunderstood
Part 1: Understanding the Problem of Business Espionage
1: Understanding the Risks
Abstract
Introduction
Risk Methodology
Risk Formula
Summary
2: Characteristics of Business Spies
Abstract
MICE
CRIME
BECCA
Project Slammer
U.S. FBI
Summary
3: High-Threat Locations for Business Espionage
Abstract
Asia-Pacific
Latin America
Europe
Africa
Middle East
More Examples
Business Espionage in Singapore
Business Espionage in Vietnam
Korea, Japan, and India
Business Espionage in Latin America
United States
Vulnerabilities Identified in Examples
Summary
4: Espionage by Electronic Means
Abstract
Introduction
Cases of Electronic Eavesdropping
Vulnerabilities Identified
Summary
5: Espionage by Force: Physical Theft or Other Appropriation
Abstract
Introduction
Cases of Business Espionage by Physical Theft or Other Appropriation
Vulnerabilities Identified
Summary
6: Facing Espionage While Traveling
Abstract
Introduction
Cases of Travelers Becoming Victims of Business Espionage
Vulnerabilities Identified
Conclusion
7: Insider Threat
Abstract
Introduction
Cases of Insider Espionage
Vulnerabilities Identified
Summary
Part 2: Business Espionage Countermeasures
8: Protecting Your Most Critical Resources
Abstract
Focus on protecting the most critical information and resources
9: Physical and Personnel Security Countermeasures
Abstract
Introduction
Business Espionage Security Awareness Training
Business Espionage Reporting Program
Travel Security Program that Includes Business Espionage Threat
Clear, Demonstrated Senior Leadership Support
Identifying and Properly Classifying Sensitive Information
Conduct a Holistic Risk Assessment
Access controls
Control of Office Machines
Use of Tiger and Red Team Testing
Non-Disclosure, Non-Compete, and Other Legal Agreements
Limiting Where/How Company Information Can Be Worked On or Discussed
Develop Special Measures for Marketing and Sales Staff
Liaise with Counterespionage Government Agencies
Offensive Counterespionage
Summary
10: Technical Electronic and Computer Countermeasures
Abstract
Introduction
Technical Surveillance Countermeasures (TSCM)
Computer countermeasures
Mobile Device Countermeasures
Summary
11: Comprehensive Countermeasures
Abstract
Introduction
Formal Integrated Approach to IT and Physical Security
Summary
Conclusion
Overview of Business Spying Lessons Learned
Vulnerabilities
Summary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Introduction
Next
Next Chapter
1: Understanding the Risks
Part 1
Understanding the Problem of Business Espionage
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset