Académique Documents
Professionnel Documents
Culture Documents
senior management executives, to office workers, down to janitorial staff. The common methods that facilitate corporate espionage among insiders include [2]: Bribery of employees by outside corporate intelligence agents. Manipulation or social engineering of IT personnel to divulge information such as logon or other authentication information, which can be used to obtain access to sensitive information. Sometimes criminals pose as authentic users, and by simple phone calls, they request a password change with little or no verification by the administrator on the other end. Disguise of voice or facial attributes in order to look or sound like someone else. Group collusion and password sharing; where several employees come together to illicitly share their privileges to gain access to sensitive information.
External Espionage
External methods are also common and are usually safeguarded by traditional firewalls. However, firewalls and secure login procedures do not solve basic security holes such as password theft, or deliberate policy violation. Computer attackers acquire passwords by a variety of means such as through password cracking programs, backdoors and Trojan horses, packet spoofing, sniffing, keystroke loggers, etc, and sometimes by mere manipulation and deceit of IT personnel via the phone or through falsified emails.
Protecting Yourself
How can we protect our financial data, intellectual property information, and trade secrets from getting into the wrong hands? The threat of espionage is clearly evident, so the real question is-how do we stop it? Well first, can a company truly protect itself from security threats inside the firewall? The answer is yes- through an inner shield of insider security agents. What most security sensitive organizations need is an Inner Security Shield; a system of insider agents that lie in-between corporate users and computer systems. At Nowell, we have developed this insider system that addresses both external intruders and internal spies. Shalom CounterEspionage Software preemptively and proactively defeats internal security threats.
How Shalom Identifies Espionage-Like Activity And Stops It. Shalom starts off by first learning how users behave (applications used, time of use, accessed networks, physical location, etc) on their computers. For each user, Shalom masters their behavioral patterns and has the ability to detect deviations, or user anomalies that intruders and bad insiders always exhibit. Shalom also learns multiple specifics by interviewing each user using artificial intelligence. Here, Shalom talks with each user in natural language. Users tell Shalom whatever they wish in an encrypted private session shared with no one. This information is later used to interrogate suspects who exhibit suspicious activity.
More Information?
For more information on Shalom, insider threats, and corporate espionage visit our Internet site at www.nowellgroup.com
References
1. Ira Winkler, Corporate Espionage: What It Is, Why Its Happening in Your Company, What You Must Do About It, Prima Publishing, Rocklin California, Jun 1997. Ben N. Venzke, Economic Industrial Espionage", http://www.computerconsultants.com/news1.htm, July 14th 2002. Richard Power, Richard Power On Corporate Espionage, http://www.techtv.com/cybercrime/print/0,23102,12005,00.html, September 15th 2000.
2. 3.