Retrieved from https://studentshare.org/information-technology/1591340-cybersecurity
https://studentshare.org/information-technology/1591340-cybersecurity.
Such attacks would only be avoided by training staff on computer security and the importance of keeping information confidential (Granger, 2002; Pietre-Cambacedes, 2011).
Being an industrial spy, I would send emails to the staff of Glassy Chemicals, a chemical company. These emails would be sent to plant software, such as Poisonlvy, used to attack 48 companies in China, and Stuxnet targeted Iran’s nuclear centrifuges as documented by Neef (2011). The message would entail psychologically tricking the recipient to install the software unknowingly, cited by Granger (2002) as a common way through which hackers accomplish their objectives. This software would tap trade secrets from the company and would be accessed by the cyber attacker. This could be avoided by installing firewalls and active antivirus software that would scan all attachments before opening (Knapp, 2009). In addition, the company should ensure that its security control limits software installation powers to system administrators only.
Read More