¶ … Netspionage, which is basically network-enabled espionage. The case entails a high-technology corporation that is situated in California which became a victim of trade secret theft to the Russians. The instance started when authorized users realized when they opened their offices on the next working day, that their computers, that they had switched off the previous day were powered on and also files as well as folders reorganized and some open. However, this matter was brushed off with the excuse that the accessed files had no significant value in addition to the fact that the accessed systems were deemed not to have any sensitive or important information. The following weekend, a desktop unit was stolen from the company and this unit had in it stored data and files consisting of valuable information in the form of quality control measures and practices for numerous of the major products of the company. The individual who had access to these documents could gain an understanding of manufacturing and quality control processes the company employed and could, hence, easily duplications the same (Boni and Kovacich, 2000). In analysis, the case study shows just how much information collection has evolved...
However, in the present day, there are much more novel, subtle and discreet methods of stealing by making use of the internet, which are much easier to collect or gather delicate information or even corrupt critical information. Different from the case study where the spies opted to steal a whole desktop from the organization, netspionage in the contemporary encompasses aspects such as computer crime and also cyber warfare. These are threats which are now a real danger to not only corporations but to governments as well (Boni and Kovacich, 2000).Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now