{"title":"Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?","authors":"Jack Schafer, M. Karlins","doi":"10.4236/jis.2021.123012","DOIUrl":null,"url":null,"abstract":"Information security often involves the development and application of sophisticated software to protect sensitive \ninformation stored in corporate computers. Yet, in this example of \ncorporate espionage, a clever person, a cellphone and some readily available \nsoftware were all it took to crack through one company’s advanced security \nbarriers. By reading this article it is hoped that employees at all levels of \nan organization’s hierarchy will become more aware of—and recognize—how: 1) \nbits and pieces of seemingly harmless and easy-to-acquire information can be \nused for sinister purposes; 2) building rapport and trust with a person can \nmake them more likely to become unknowing co-conspirators in a devious \nundertaking; and 3) how one must be constantly alert not to give out information \nwithout carefully considering the authenticity and justification of the source \nrequesting it.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2021.123012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Information security often involves the development and application of sophisticated software to protect sensitive
information stored in corporate computers. Yet, in this example of
corporate espionage, a clever person, a cellphone and some readily available
software were all it took to crack through one company’s advanced security
barriers. By reading this article it is hoped that employees at all levels of
an organization’s hierarchy will become more aware of—and recognize—how: 1)
bits and pieces of seemingly harmless and easy-to-acquire information can be
used for sinister purposes; 2) building rapport and trust with a person can
make them more likely to become unknowing co-conspirators in a devious
undertaking; and 3) how one must be constantly alert not to give out information
without carefully considering the authenticity and justification of the source
requesting it.