Site Search
Course Navigation
Corporate Espionage
Corporate Espionage
We Mean information assets
The product is:
We've got to know our vulnerabilities
What is Corporate Espionage?
What is Corporate Espionage?
What it is?
Forms information can take
Information is information no matter what form it takes
Cases to look at
I spy
The Risk Equation
What is value?
Damage Inflicted
Quiz Yourself
Why and how is Espionage happening?
Why and how is Espionage happening?
Why it's happening in your company?
Vulnerabilities can be classified into 4 Types
Operations Vulnerabilities
Human
Creative
Communications Related
Controls and their vulnerabilities
Physical vulnerabilities
Indian Car Manufacturer
Multinational household Appliance Manufacturer
Reserve Bank of India
A Common Problem
ITC Case
Personnel vulnerabilities
Blow Plast Limited
But apart from
Technical vulnerabilities
Systems have (well-known vulnerabilities)
Poor Passwords
Ministry of Information Technology
Interception during transmission
TEMPEST
Electromagnetic Pulse
Telephone Taps and Bugs
Quiz Yourself
What can be done
What can be done
What you must do to stop it
Know your vulnerabilities
Consider Risk
Counter measures
Operations Countermeasures
Awareness creation
Educate Employees
Employee Power Harnessed
Call Back Check
Verify Need For Access To Information
Verifying Identities and Purposes
Access Badges Without Names
Frequent Contact with Outsiders Employees of Rival Firms
Non-Disclosure Non-Compete Employee Undertakings
Creative countermeasures
Preview Releases
Strict Guidelines for Sales Marketing People
Communications Related Countermeasures
Communications Related Countermeasures
Monitoring Internet Activity
Monitoring Technical Vulnerabilities
Off-PABX Direct Phone Line Limit Talks
Minimize Use of Cellular Cordless Phones
Don't Talk About Work Outside the Office
Controls Fallout
NCND Clauses in Business Agreements
Physical Security and Contingency Measures
Integrating Security with Other Departments
Drill For Disaster Situations
Personnel Counter measures
Background Verification
Examples
Control Contracted Services
Physical Countermeasures
Documents
Facility security
Milk food Manufacturer
Technical Countermeasures
What are Firewalls
What a Firewall Does
How it works
Secure Socket Layer SSL For Business Users
What is SSL
Setting up your order form
Other Technical Countermeasures
Intrusion Detectors
Access Controls
Password Checkers
Perishable Password
Account Lockouts
Audit Logs
Mirrored Logs
Use Write Protect Disks
Adequate Software Testing
ATMs
Other Valuable Countermeasures
Conclusion
Create awareness at
Quiz Yourself
Open Learning World .Com
Home
|
Course Catalog
|
Career Planning
Q
1
You have recently taken over as General Manager of a large concern manufacturing FMCGs. Although the company appears to be stable and progressing well, at first glance, one or two things are bothering you. One is the apparently high-turnover of personnel in R&D and Formulations. The other is that, given the potential of the company, it is not making the sort of headway it should be making. You decide to (TICK ONE)
(a)
Call a meeting of senior officers to discuss the matter
(b)
Make a list of all strengths, weaknesses, opportunities & threats-do a SWOT analysis , in short, add two and two together.
(c)
Call in an outside consultant to probe the problem
(d)
Leave it to your Dy. General Manager to find out the facts and report.
Good! Your Answer is Right
Correct Answer is (b)
1. This is a highly sensitive matter. Do you really want to reveal your involvement at this stage? And that too, to all senior officers? Do you know the enemy?
2. SWOT analyses have a way of helping you add two and two together, as they compel the use of logic. When you eliminate the impossible, as Sherlock Holmes said, the residue, no matter how unacceptable, has to be the truth. If high turnover (and that too from your key departments of R&D and Formulations) of personnel for no apparent reason is linked to the falling sales and market share, the root cause may be that your have been targeted for a sustained attack by a competitor through a Head Hunter (a placement/HR consultant who targets/pirates select employees to fill a client's requirements). The people so recruited, then cough up all your secrets.
3. Not recommended in this case unless you want to make a retaliatory strike.
4. And who knows how badly he wanted the job you got.
Our Network Of Sites:
Apply 4 Admissions.com
|
A2ZColleges.com
|
OpenLearningWorld.com
|
Totaram.com
Anatomy Colleges.com
|
Anesthesiology Schools.com
|
Architecture Colleges.com
|
Audiology Schools.com
Cardiology Colleges.com
|
Computer Science Colleges.com
|
Computer Science Schools.com
|
Dermatology Schools.com
Epidemiology Schools.com
|
Gastroenterology Schools.com
|
Hematology Schools.com
|
Immunology Schools.com
IT Colleges.com
|
Kinesiology Schools.com
|
Language Colleges.com
|
Music Colleges.com
Nephrology Schools.com
|
Neurology Schools.com
|
Neurosurgery Schools.com
|
Obstetrics Schools.com
Oncology Schools.com
|
Ophthalmology Schools.com
|
Orthopedics Schools.com
|
Osteopathy Schools.com
Otolaryngology Schools.com
|
Pathology Schools.com
|
Pediatrics Schools.com
|
Physical Therapy Colleges.com
Plastic Surgery Schools.com
|
Podiatry Schools.com
|
Psychiatry Schools.com
|
Pulmonary Schools.com
Radiology Schools.com
|
Sports Medicine Schools.com
|
Surgery Schools.com
|
Toxicology Schools.com
US Law Colleges.com
|
US Med Schools.com
|
US Dental Schools.com
About Us
|
Terms of Use
|
Contact Us
|
Partner with Us
|
Press Release
|
Sitemap
|
Disclaimer
|
Privacy Policy
©1999-2011 OpenLearningWorld . com - All Rights Reserved