Countering Espionage: An Enterprise Risk Management View
I am neither a political scientist nor a historian. However, I am conscious of some certain past events in human history which had political impacts and also influenced the course of history as we know it. Some say such events occurred on the basis of social, political and historical backgrounds and factors, whilst others pointed out to the certain historical events which triggered in very odd and peculiar ways. We know them as “Espionage”, mostly with a covert, repulsive and hideous nature.
The Trojan Horse is perhaps one of the best narratives of espionage. It was an unprecedented military technique by the ancient Greeks. It enabled Greeks to take the heavily fortified city of Troy and sabotage their defense system. In terms of computer security, a digital trojan horse functions exactly as this historical example did.
The second example happened in the late 19th and early 20th century right before the start of the First World War. It began when some artillery designs in French military were compromised and given to the Germans. This came to the attention of some internal French military. Captain Alfred Dreyfus was named as the main suspect, and he spent five years in jail whilst the responsible individual lived free.
Introduction
In today’s world, espionage is being tangled with some of the greatest achievements human being ever harnessed in the field of technology. Such achievements provided effective and efficient methods to enable very sophisticated espionage activities which we never imagined before. Having said that, the human factor always had a central role in such covert activities. This puts the Boards of so many businesses in an uneasy situation. Corporations have trade secrets, patents and intellectual properties which give them a competitive advantage on the world stage. Corporations must protect their secrets (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/countering-espionage-an-enterprise-risk-management-view/