Computer security – industrial espionage
Required Videos Required Readings Read Chapter 7 of the Easttom text, Industrial Espionage in Cyberspace Primary topics: Information as an Asset Real-World Examples of Industrial Espionage Steganography Phone Taps and Bugs Spear Phishing Week Eight Assignment Consider this hypothetical situation: David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with […]