Secrets stolen, fortunes lost: preventing intellectual property theft and economic espionage in the 21st century
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, Mass.
Syngress
2008
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016521267&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XX, 357 S. Ill., graph. Darst. |
ISBN: | 1597492558 9781597492553 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023337427 | ||
003 | DE-604 | ||
005 | 20090123 | ||
007 | t| | ||
008 | 080610s2008 xx ad|| |||| 00||| eng d | ||
020 | |a 1597492558 |c (pbk) : £34.99 pbk : £34.99 : CIP entry (Apr.) |9 1-59749-255-8 | ||
020 | |a 9781597492553 |9 978-1-59749-255-3 | ||
024 | 3 | |a 9781597492553 | |
035 | |a (DE-599)BSZ280991975 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-M382 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Burgess, Christopher |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secrets stolen, fortunes lost |b preventing intellectual property theft and economic espionage in the 21st century |c Christopher Burgess ; Richard Power |
264 | 1 | |a Burlington, Mass. |b Syngress |c 2008 | |
300 | |a XX, 357 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Business intelligence | |
650 | 4 | |a Intellectual property / Economic aspects | |
650 | 4 | |a Intellectual capital / Management | |
700 | 1 | |a Power, Richard |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016521267&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016521267 |
Datensatz im Suchindex
_version_ | 1819304459678777344 |
---|---|
adam_text | Contents
Introduction..................................................xiii
Part 1 The Challenge.............................................1
Chapter 1 The Tale of the Targeted Trojan...........................3
Introduction...................................................4
The Haephrati Case..............................................5
The When.................................................6
The How.................................................6
The Hook................................................6
The Mechanism............................................6
The Who..................................................7
The Why..................................................7
The Cost..................................................7
The Discovery..............................................8
The Scope.................................................9
Alleged Intermediary Clients...............................9
Alleged End-Recipients...................................9
Companies Identified as Victims............................10
Related U.S./UK Advisories..................................11
UK — National Infrastructure Security Coordination Centre (NISCC) ... 11
U.S.-The Department of Homeland Security (DHS)............12
Chapter 2 When Insiders and/or Competitors Target
a Business s Intellectual Property..............................15
Introduction..................................................16
Lightwave Microsystems.........................................16
America Online...............................................18
Casiano Communications........................................19
Corning and PicVue............................................20
Avery Dennison and Four Pillars...................................22
Lexar Media and Toshiba.........................................24
SigmaTel and Citroen...........................................27
3dGEO - China...............................................29
Chapter 3 When State Entities Target a Business s Intellectual Property ... 31
Introduction..................................................32
Airbus and Saudi Arabian Airlines...................................33
vii
viii Contents
Russian Intelligence and Japanese Trade Secrets.........................33
Japan and the Cleveland Clinic Foundation............................36
China and Russia: TsNIIMASH-Export..............................38
Overt Nation State Attempts: India,Venezuela, Brazil, and Others...........39
Current and Future Threats to Economic Security......................41
Chapter 4 When Piracy, Counterfeiting, and Organized
Crime Target a Business s Intellectual Property...................45
Introduction..................................................46
Technology Counterfeiting.......................................50
The Apparel Industry............................................52
The Entertainment Industry.......................................53
Chapter 5 Virtual Roundtable on Intellectual Property
and Economic Espionage.....................................57
Introduction..................................................58
The Legal Perspective: Naomi Fine.................................60
The OpSec Perspective: Keith Rhodes...............................65
The Professional Investigator s Perspective: Ed Stroz.....................70
The DoD Cyber Sleuth s Perspective: James Christy.....................77
The Security and Privacy Consultant s Perspective: Rebecca Herold.........81
Part 2 The Strategy.............................................87
Chapter 6 Elements of a Holistic Program...........................89
Introduction..................................................90
False Memes Lead People the Wrong Way............................90
From the Industrial Age to the Information Age......................91
Chapter 7 Case Study: Cisco s Award-Winning
Awareness Program.........................................97
Introduction..................................................98
What Is This Scenario?......................................... 100
The Message Is the Medium: Be a Security Champion.................. 102
The Message............................................. 102
When Your Message Reaches the Employees
They Become Your Messengers................................ 105
Staying on Message............................................ 106
It Takes More Than Compelling Content and Hard Work................ 109
Lessons Learned............................. ... 110
Contents ix
Chapter 8 Case Study: A Bold New Approach in Awareness
and Education Meets an Ignoble Fate.........................113
Introduction................................................. 114
The Mission, the Medium, the Message............................. 114
Meaningful Content and Persuasive Delivery......................... 114
Investment and Empowerment.................................... 116
Three-Phase Approach.......................................... 116
Phase I: Engage Everyone Economically and Effectively.............. 117
Phase II: A Rising Tide Lifts All the Boats........................ 119
Phase III: Deliver Vital Intelligence and
Early Warning to the Executive............................. 120
Don t Be Surprised If............................................ 121
Chapter 9 Case Study: The Mysterious Social Engineering
Attacks on Entity Y......................................... 127
Introduction................................................. 128
Fundamentals of Social Engineering Attacks.......................... 129
The Mysterious Social Engineering Attacks on Entity Y................. 133
Guidance for the Workforce...................................... 135
How to Recognize Elicitation................................ 135
How to Handle the Caller................................... 136
How to Report the Incident................................. 136
General User-Oriented Guidance on How to Detect
and Defeat Social Engineering............................. 137
Chapter 10 Personnel Security...................................139
Introduction................................................. 140
Coming and Going: Guidelines for Background Checks
and Termination Procedures.................................. 143
Two Important Caveats..................................... 154
And Everywhere in between: Guidelines for Travel Security
and Executive Protection Programs............................. 154
Chapter 11 Physical Security: The Duh Factor.....................161
Introduction.................................................162
Chapter 12 Information Security.................................187
Introduction.................................................188
Contents
Chapter 13 The Intelligent Approach..............................227
Introduction.................................................^28
The Intelligence Function As an Internal Early Warning System...........230
What Happens to a Million Grains of Sand in a Perfect Storm?............232
The Partnership Issue Is a Daunting Force-Multiplier,
Double-Edged Sword.......................................234
Chapter 14 Protecting Intellectual Property
in a Crisis Situation.........................................237
Introduction.................................................238
Chapter 15 How to Sell Your Intellectual
Property Protection Program.................................247
Introduction.................................................248
Questions to Ask and People to Approach...........................250
What Is Your Business Differentiation from Your Competitors?............251
Whom Do You Have to Protect These Differentiators From?..........252
What Are the Probabilities in Terms of Likely
Attackers, Targets, and Objectives?...........................254
If the Competition Obtained or Tampered with Your
Intellectual Property, What Harm Would Be Done?..............255
What Security Measures Would Be Cost-Effective
and Business-Enabling?...................................255
Notes on Figure 15.1...........................................257
Notes on Figure 15.2...........................................257
Executives and Board Members...............................257
Research and Development..................................257
Manufacturing............................................258
Sales and Marketing........................................258
Human Resources.........................................258
Operations...............................................259
Risk Identification.........................................259
Implications of IP loss..........................................260
Notes on Figure 15.3...........................................261
Implementation Plan.......................................261
Potential Inhibitors.........................................261
Identified Milestones.......................................261
Notes on Figure 15.4...........................................262
Notes on Figure 15.5...........................................263
Executive Commitment.....................................263
Business Value Statement.....................................263
Notes.........................
Contents xi
Chapter 16 Conclusion..........................................265
Protect Your IP...............................................266
Appendix A Baseline Controls for Information
Security Mapped to ISO.....................................267
Appendix B Leveraging Your Tax Dollar...........................289
Domestic................................................290
Department of Justice (DOJ)................................290
Department of Homeland Security (DHS)......................292
International.............................................294
Department of Commerce (DOC)............................294
Department of State (DOS).................................294
Appendix C Notes on Cyber Forensics.............................297
Digital EvidenceiVolume........................................29S
Digital Evidence: Searches/Legal..................................299
Digital Evidence: Cell Phones....................................300
Digital Evidence: Accreditation...................................301
Definitions...............................................302
Digital Evidence: Digital Forensics Intelligence........................302
Appendix D U.S. International Trade Commission
Section 337 Process........................................305
Appendix E U.S. Trade Representative s 2007
Special 301 Watch List......................................339
Appendix F U.S. Department of Justice Checklist for
Reporting a Theft of Trade Secrets Offense.......................343
Index........................................................349
|
any_adam_object | 1 |
author | Burgess, Christopher Power, Richard |
author_facet | Burgess, Christopher Power, Richard |
author_role | aut aut |
author_sort | Burgess, Christopher |
author_variant | c b cb r p rp |
building | Verbundindex |
bvnumber | BV023337427 |
classification_rvk | ST 277 |
ctrlnum | (DE-599)BSZ280991975 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01389nam a2200337 c 4500</leader><controlfield tag="001">BV023337427</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090123 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080610s2008 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492558</subfield><subfield code="c">(pbk) : £34.99 pbk : £34.99 : CIP entry (Apr.)</subfield><subfield code="9">1-59749-255-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492553</subfield><subfield code="9">978-1-59749-255-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781597492553</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ280991975</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Burgess, Christopher</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secrets stolen, fortunes lost</subfield><subfield code="b">preventing intellectual property theft and economic espionage in the 21st century</subfield><subfield code="c">Christopher Burgess ; Richard Power</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 357 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intellectual property / Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intellectual capital / Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Power, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016521267&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016521267</subfield></datafield></record></collection> |
id | DE-604.BV023337427 |
illustrated | Illustrated |
indexdate | 2024-12-20T13:13:54Z |
institution | BVB |
isbn | 1597492558 9781597492553 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016521267 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | XX, 357 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress |
record_format | marc |
spellingShingle | Burgess, Christopher Power, Richard Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century Business intelligence Intellectual property / Economic aspects Intellectual capital / Management |
title | Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century |
title_auth | Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century |
title_exact_search | Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century |
title_full | Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century Christopher Burgess ; Richard Power |
title_fullStr | Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century Christopher Burgess ; Richard Power |
title_full_unstemmed | Secrets stolen, fortunes lost preventing intellectual property theft and economic espionage in the 21st century Christopher Burgess ; Richard Power |
title_short | Secrets stolen, fortunes lost |
title_sort | secrets stolen fortunes lost preventing intellectual property theft and economic espionage in the 21st century |
title_sub | preventing intellectual property theft and economic espionage in the 21st century |
topic | Business intelligence Intellectual property / Economic aspects Intellectual capital / Management |
topic_facet | Business intelligence Intellectual property / Economic aspects Intellectual capital / Management |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016521267&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT burgesschristopher secretsstolenfortuneslostpreventingintellectualpropertytheftandeconomicespionageinthe21stcentury AT powerrichard secretsstolenfortuneslostpreventingintellectualpropertytheftandeconomicespionageinthe21stcentury |