Abstract
This chapter opens with a brief overview of the security threats faced by industry and our lack of preparedness against sophisticated cyber adversaries. It then classifies the types of individuals that threaten our security and describes the tools they use to perpetrate crimes and perform acts of industrial espionage. It ends with an overview of the techniques we can use to guard our organizations against cyber attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ashcroft, John (2001). Reported in U.S. Department of Justice, A Review of FBI Security Programs, Commission for Review of FBI Security Programs, March 2002
Clarke, Richard (2002). Reported in David Coursey, “Cyberterrorism-the new Cold War,” ZDNet UK, 22nd February 2002
Interagency OPSEC Support Staff. http://www.ioss.gov/
Office of the National Counter Intelligence Executive (2000) http://www.ncix.gov/
SC InfoSec OpinionWire, Wednesday, December 11, 2002 http://www.infosecnews.com/opinion/2002/12/11_01.ht
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Kluwer Academic Publishers
About this chapter
Cite this chapter
Demirkaya, Y. (2004). Computer Security: Sophisticated Enemies. In: Ghosh, S., Malek, M., Stohr, E.A. (eds) Guarding Your Business. Springer, Boston, MA. https://doi.org/10.1007/0-306-48638-5_3
Download citation
DOI: https://doi.org/10.1007/0-306-48638-5_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-306-48494-0
Online ISBN: 978-0-306-48638-8
eBook Packages: Springer Book Archive