Instructor’s Manual Materials to Accompany
COMPUTER SECURITY FUNDAMENTALS
INDUSTRIAL ESPIONAGE IN CYBERSPACE
CHAPTER 7 OBJECTIVES
When students finish reading this chapter, they will be able to:
• Know what is meant by industrial espionage.
• Understand the low-technology methods used to attempt industrial espionage.
• Be aware of how spyware is used in espionage.
• Know how to protect a system from espionage.
Industrial espionage is a real and growing problem. Company economic goals are frequently dependent on
accurate and often sensitive data. With billions of dollars at stake, private companies may become engaged in
industrial espionage. It can be difficult to accurately assess just how great a problem it is. For obvious reasons,
companies that perpetrate corporate espionage do not share that they do it, and companies that are victims of such
espionage often do not want to reveal that fact. To protect yourself and your company, students must learn about
espionage methods and safeguards. In the exercises at the end of this chapter, students run antispyware, key
loggers, and screen capture software to become familiar with how they work.
The major sections in this chapter are