0133050866_vc MIS13_CH08_Case2_Cyberespionage.pdfVIP

  • 40
  • 0
  • 约1.41万字
  • 约 5页
  • 2017-04-25 发布于广东
  • 举报
0133050866_vc MIS13_CH08_Case2_Cyberespionage.pdf

Management Information Systems 13e KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 8 SECURING INFORMATION SYSTEMS CASE 2 Cyberespionage: The Chinese Threat VIDEO CASE SUMMARY This video examines the economic and national security costs of cyberespionage. Cyberespionage involves the theft of intellectual property, as well asSy valuablestems situational and personal information, using surreptitious means on the Internet. While many advanced nations engage in cyberespionage, China has been implicated in many major cyberespionage programs aimed at the United States. L= 21:14. URL /watch?v=Js52FjOsgPA CASE Cyberespionage is very different from cyberwarfare. The objective in cyberespio- nage is to, without detection, gain access to computer systems that contain valuable commercial and/or military information; to remain in place for continuous data gather- ing; and to remove data from the target system. The point is not to destroy enemy systems, but instead to colocate inside them and continuously drain information. This is similar to the goals of the British intelligence agency MI6 during World War II, when they broke the military codes of the Germans quite early in the war. MI6 spent a great deal of effort to insure the Germans never discovered their communications were being closely monitored and intercepted for over four years. In contrast, the objec- tive of cyberwarfare is to destroy and disrupt enemy capabilities. When cyberwarfare succeeds, the very fact of succeeding permits the enemy to become aware of the intru- sion and take steps to defend itself. continued Chapter 8, C

文档评论(0)

1亿VIP精品文档

相关文档