LEADER 00676nam0-2200253 --450 001 9910673393303321 005 20230322154155.0 010 $a0140710116 100 $a20230322d1973----kmuy0itay5050 ba 101 0 $aeng 102 $aGB 105 $a 001yy 200 1 $aLondon$eI thew cities of London and Westminster$fNikolaus Pevsner 210 $aLondon$cPenguin Books$d1973 215 $a753 p.$d18 cm 610 0 $aLondra 700 1$aPevsner,$bNikolaus$01598 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910673393303321 952 $aFONDO ROSSI 4987$bROSSI 5309$fFARBC 959 $aFARBC 996 $aLondon$93059402 997 $aUNINA LEADER 05602nam 2200613 450 001 9910827894803321 005 20230120002159.0 010 $a0-12-420059-1 010 $a0-12-420054-0 035 $a(CKB)3710000000378866 035 $a(EBL)1997675 035 $a(SSID)ssj0001491198 035 $a(PQKBManifestationID)11892436 035 $a(PQKBTitleCode)TC0001491198 035 $a(PQKBWorkID)11507741 035 $a(PQKB)11579915 035 $a(Au-PeEL)EBL1997675 035 $a(CaPaEBR)ebr11035746 035 $a(CaONFJC)MIL785244 035 $a(OCoLC)908041044 035 $a(CaSebORM)9780124200548 035 $a(MiAaPQ)EBC1997675 035 $a(EXLCZ)993710000000378866 100 $a20141212h20152015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBusiness espionage $erisk, threats, and countermeasures /$fBruce Wimmer 205 $aFirst edition. 210 1$aWaltham, Massachusetts :$cElsevier,$d[2015] 210 4$dİ2015 215 $a1 online resource (210 p.) 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business Espionage 327 $aAsia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other Appropriation 327 $aVulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness Training 327 $aKey Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection Team 327 $aDo Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or Discussed 327 $aDevelop Special Measures for Marketing and Sales Staff 330 $a Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author?s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. Shows how to identify a company?s threats, weaknesses, and most critical assets Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed 606 $aBusiness intelligence 615 0$aBusiness intelligence. 676 $a658.472 700 $aWimmer$b Bruce$01683676 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827894803321 996 $aBusiness espionage$94054625 997 $aUNINA