Site Search

Course Navigation


Home| Course Catalog| Career Planning

FREE online courses on Corporate Espionage - What is Corporate Espionage - The Risk Equation

If Mt. Everest or Nanda Devi were easy to climb, if it wasn't risky, you or I might try to scale it. Since its very risky, few climbers attempt it and settle for easier targets. So it is with information: the harder you make it for someone to steal, the lower the chances of its loss.

An auto parts (light bulbs) manufacturer who had successfully introduced halogen bulbs was well prepared to block attempts by rivals to breach his security. It was his high level of preparedness, covering all known vulnerabilities that repulsed a determined attack. But the secret is:

ETERNAL VIGILANCE – and you can only do that if your PEOPLE ARE AWARE OF THE PROBLEM. You cannot do it alone.

 

RISK     =            Vulnerability x Value                x Threat

                  Precautions of (Countermeasures)


The high VALUE of your information and low level of preparedness to protect it, multiplies the threat, and results in a certain level of risk, as illustrated:

WHAT IS VALUE

It is composed of six elements:

  • Monetary value: Which is the market value, or resale value of the item Ex. Your car.
  • Hidden value: This translates into its usefulness to you. Your car gets you quickly and safely to a business meeting where you clinch a deal with good profit potential.
  • Integrity value: How good your car is. If its been sabotaged or tampered with, it can let you down – its usefulness has been severely compromised, endangering your life, business and your employees' futures.
  • Availability value: If your son is always driving off in it just when you need it, its availability is low, and so is its value, in real terms, to you.
  • Confidentiality Value:  The less well known your car / registration number is, the higher your anonymity, and, therefore, lower your chances of being followed, observed or worse. President Clinton travels in one of six identical cars in a motorcade, so no one really knows which car he is in. When he flew in to Bangladesh in March 2000, he did not go in AIR FORCE ONE (his official jet) but in an unmarked, smaller aircraft.
  • Adversary (Competitor) Value: How valuable is your car (or your company information) to your opponent? He can disable or seriously inconvenience/embarrass you by getting your car stolen. He can even use your car at another location, both options profiting him vastly.

Damage Inflicted

Hackers have been known to redirect sales orders on e-Business websites to other websites who take the orders (and profits). Information, which is intercepted by another, means lost business for you. When hackers attacked the websites of the Indian parliament, of the Ministry of Information Technology, of banks, firms, newspapers – they not only damaged their image, credibility and functioning – they also severely affected morale, and overall value of the websites. Since these websites were maliciously altered, with anti-India slogans and abuses, we can only believe that the culprits were from a hostile nation(s) or militant Islamic fundamentalist factions that have declared a  ‘Jehad' on India.

These websites were, therefore, of value to adversaries, in inflicting damage on the target country. (To reduce value to the adversary, the website could have been better fortified against intrusion and equipped with infiltration detectors).

Precautions/counter – measures would have made the websites very hard to hack and risk of detection would have been high. Hence, the RISK WOULD HAVE COME DOWN PROPORTIONATE TO THE DANGER/ EFFORT PERCEIVED BY THE HACKERS. The same holds true for hijackers, saboteurs and espionage agents.

 

Our Network Of Sites:
Apply 4 Admissions.com              | A2ZColleges.com  | OpenLearningWorld.com  | Totaram.com
Anatomy Colleges.com                | Anesthesiology Schools.com  | Architecture Colleges.com | Audiology Schools.com
Cardiology Colleges.com            | Computer Science Colleges.com| Computer Science Schools.com| Dermatology Schools.com
Epidemiology Schools.com         | Gastroenterology Schools.com  | Hematology Schools.com     | Immunology Schools.com
IT Colleges.com                | Kinesiology Schools.com  | Language Colleges.com  | Music Colleges.com
Nephrology Schools.com             | Neurology Schools.com  | Neurosurgery Schools.com | Obstetrics Schools.com
Oncology Schools.com    | Ophthalmology Schools.com | Orthopedics Schools.com       | Osteopathy Schools.com
Otolaryngology Schools.com| Pathology Schools.com  | Pediatrics Schools.com  | Physical Therapy Colleges.com
Plastic Surgery Schools.com| Podiatry Schools.com  | Psychiatry Schools.com   | Pulmonary Schools.com 
Radiology Schools.com| Sports Medicine Schools.com| Surgery Schools.com | Toxicology Schools.com
US Law Colleges.com| US Med Schools.com | US Dental Schools.com

About Us Terms of Use | Contact Us | Partner with Us | Press Release | Sitemap | Disclaimer | Privacy Policy


©1999-2011 OpenLearningWorld . com - All Rights Reserved