Join getAbstract to access the summary!

Secrets of Computer Espionage

Join getAbstract to access the summary!

Secrets of Computer Espionage

Tactics and Countermeasures

Wiley,

15 min read
10 take-aways
Audio & text

What's inside?

Who wants the secret info on your computer? Corporate spies, cops, spiteful kin? Protect yourself and your machine.

auto-generated audio
auto-generated audio

Editorial Rating

9

Qualities

  • Innovative
  • Applicable

Recommendation

You and your computer face a dizzying array of security threats, writes tech consultant Joel McNamara. Competitors, cops, crooks and even disgruntled kin would love a peek at your hard drive. But don’t hyperventilate just yet. If you calmly analyze the desirability and vulnerability of your secrets, you can figure out how to protect yourself. McNamara’s prose is surprisingly clear given the degree of difficulty of his topic, and he offers a number of useful sidebars, charts and examples from inside the tech business to juice up his instructional tome. getAbstract.com suggests this practical book to managers charged with protecting corporate data, and to people who are unsure just how safe their computers are.

Summary

The Digital Spies All Around Us

The information technology revolution means computers house more and more secret information, whether it’s the business plan and customer list your corporate competitors would love to get their hands on, or the instant messaging chats that would make your jealous ex fume. Because so much sensitive data is stored on computers, your networks and hard drives are inviting targets for people who want to pry into your affairs, either legally or illegally. Depending on the situation, bosses, cops, hackers, co-workers, rivals, family members and even corporate spies want to know what you’ve been doing at the keyboard. They’re helped in their efforts by easily downloaded programs that let them spy on you. Keep in mind that while hackers garner most of the media attention, you’re more likely to be sabotaged from someone inside your organization or family.

So who’s poking around in your digital affairs? Here’s the list of usual suspects:

  • Business spies - This is a huge and costly problem. According to one survey, 40% of U.S. companies reported being victimized by corporate espionage. The theft of confidential information cost ...

About the Author

Consultant Joel McNamara has 20 years of experience in the computer industry. Formerly a technical writer and training manager at Microsoft, he developed one of the first Microsoft viruses to expose security risks. He is the creator of Private Idaho, an open source Internet privacy tool. McNamara also runs the Complete Unofficial TEMPEST Information Page, a Web site that explains government surveillance technology.


Comment on this summary