Journal of Information Security

Volume 12, Issue 3 (July 2021)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?

HTML  XML Download Download as PDF (Size: 206KB)  PP. 224-231  
DOI: 10.4236/jis.2021.123012    278 Downloads   1,475 Views  Citations

ABSTRACT

Information security often involves the development and application of sophisticated software to protect sensitive information stored in corporate computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes; 2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking; and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.

Share and Cite:

Schafer, J. and Karlins, M. (2021) Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?. Journal of Information Security, 12, 224-231. doi: 10.4236/jis.2021.123012.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.