Skip to main content

2018 | OriginalPaper | Buchkapitel

3. The Human Element: The “Trigger” on Cyber Weapons

verfasst von : John J. McGonagle

Erschienen in: Cyber Weaponry

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter discusses the protection of businesses from cyber penetrations using the lessons and principles of defending firms against competitive intelligence operations. Although popular culture could lead one to believe that cyber penetrations are all about devices and software exploits, the reality is that the human element plays a pivotal part. In our high-tech society, cyber penetrations all too often rely on low-tech approaches, which can often easily be foiled by alert employees and contractors. Without employee and contractor gullibility, it would be difficult to impossible to penetrate a well-crafted cyber-security system. Like the first reported swindler who conned people in to giving them their watches, today’s con artists are focused on big prizes—information. This chapter examines data and the methods businesses can use to identify what is critical to their operations, and some simple, yet effective ways to protect it. These approaches are used in competitive intelligence and state that regardless of the high-tech environment in which corporations operate, cyber penetrations are often facilitated by low-tech approaches via the human element.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
He is reported to have used other names, including William Thompson (Braucher and Orbach 2015: 252, fn. 16).
 
Literatur
Zurück zum Zitat Bayuk J, Healey J, Rohmeyer P, Sachs M, Schmidt J, Weiss J, Joseph (2012) Cyber-security policy handbook. Wiley, HobokenCrossRef Bayuk J, Healey J, Rohmeyer P, Sachs M, Schmidt J, Weiss J, Joseph (2012) Cyber-security policy handbook. Wiley, HobokenCrossRef
Zurück zum Zitat Braucher J, Orbach B (2015) Scamming: the misunderstood confidence man. Yale J Law Umanit 27(2):249 Braucher J, Orbach B (2015) Scamming: the misunderstood confidence man. Yale J Law Umanit 27(2):249
Zurück zum Zitat Bremmer I (2017) The real cost of ‘forced transparency’. Time, March 16, 2017, p 14 Bremmer I (2017) The real cost of ‘forced transparency’. Time, March 16, 2017, p 14
Zurück zum Zitat Downing D, Covington M, Covington M, Covington C (2009) Dictionary of computer and internet terms, 10th edn. Barron’s Educational Series, Inc, Hauppauge Downing D, Covington M, Covington M, Covington C (2009) Dictionary of computer and internet terms, 10th edn. Barron’s Educational Series, Inc, Hauppauge
Zurück zum Zitat Enslin v. The Coca-Cola Company et al. US district court for the eastern district of Pennsylvania., No. 2:14-cv-06476. Opinion 31 Mar 2017 Enslin v. The Coca-Cola Company et al. US district court for the eastern district of Pennsylvania., No. 2:14-cv-06476. Opinion 31 Mar 2017
Zurück zum Zitat Hackett, Robert, Jeff John Roberts (2017) The future of online security. Fortune, May 1, 2017, pp 75–76 Hackett, Robert, Jeff John Roberts (2017) The future of online security. Fortune, May 1, 2017, pp 75–76
Zurück zum Zitat McGonagle JJ, Vella CM (1998) Protecting your company against competitive intelligence. Praeger, New York McGonagle JJ, Vella CM (1998) Protecting your company against competitive intelligence. Praeger, New York
Zurück zum Zitat Mitnick KD, Simon WL (2002) The art of deception. Wiley Publishing, Indianapolis Mitnick KD, Simon WL (2002) The art of deception. Wiley Publishing, Indianapolis
Zurück zum Zitat Prunckun H (2015) Scientific methods of inquiry for intelligence analysis, 2nd edn. Scarecrow Press, Lanham Prunckun H (2015) Scientific methods of inquiry for intelligence analysis, 2nd edn. Scarecrow Press, Lanham
Zurück zum Zitat Ruffini A (2017) Stay safe and enjoy the event. Incentive. 10 January/February 2017 Ruffini A (2017) Stay safe and enjoy the event. Incentive. 10 January/February 2017
Zurück zum Zitat Sjouwerman S (2017a) Dominos still falling 3 years after Yahoo data breach. Reading Eagle, Business Weekly, 7. March 28, 2017 Sjouwerman S (2017a) Dominos still falling 3 years after Yahoo data breach. Reading Eagle, Business Weekly, 7. March 28, 2017
Zurück zum Zitat Sjouwerman S (2017b) New phishing attack works 90% of time. Reading Eagle, Business Weekly, 7, April 11, 2017 Sjouwerman S (2017b) New phishing attack works 90% of time. Reading Eagle, Business Weekly, 7, April 11, 2017
Zurück zum Zitat Sjouwerman S (2017c) Pew survey finds Americans weak on online security issues. Reading Eagle, April 18, 2017 Sjouwerman S (2017c) Pew survey finds Americans weak on online security issues. Reading Eagle, April 18, 2017
Zurück zum Zitat Sjouwerman S (2017d) Scam of the week blends CWO Fraud, W-2 phishing. Reading Eagle, February 14, 2017 Sjouwerman S (2017d) Scam of the week blends CWO Fraud, W-2 phishing. Reading Eagle, February 14, 2017
Zurück zum Zitat Tolman WH (1909) Social engineering. McGraw Publishing Co., New York Tolman WH (1909) Social engineering. McGraw Publishing Co., New York
Zurück zum Zitat Vella CM, McGonagle JJ (2017) Competitive intelligence rescue: getting it right. Praeger, New York Vella CM, McGonagle JJ (2017) Competitive intelligence rescue: getting it right. Praeger, New York
Zurück zum Zitat Walsh B (2017) A safer, smarter grid. Time, April 10, 2017, pp 30–32 Walsh B (2017) A safer, smarter grid. Time, April 10, 2017, pp 30–32
Zurück zum Zitat Washington Post (2017) Hack claims he’s released new episodes of netflix series. Reading Eagle, April 30, 2017, p A6 Washington Post (2017) Hack claims he’s released new episodes of netflix series. Reading Eagle, April 30, 2017, p A6
Metadaten
Titel
The Human Element: The “Trigger” on Cyber Weapons
verfasst von
John J. McGonagle
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-74107-9_3