Industrial espionage from residual data: Risks and countermeasures
Document Type
Conference Proceeding
Publisher
School of Computer and Information Science, Edith Cowan University
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science / Centre for Security Research
RAS ID
5581
Abstract
This paper outlines the possible recovery of potentially sensitive corporate information from residual data. It outlines previous work on the recovery of information contained on second hand hard disks and handheld devices and discusses the risk of individuals conducting industrial espionage by targeting specific organizations. It examines the possible avenues for an attacker to obtain a storage device, then discusses the skill level required to extract information from the storage devices and considers the potential risk to an organization from this particular avenue of attack. The paper concludes by proposing a number of possible countermeasures to enable organizations to reduce the risk of this particular form of attack
DOI
10.4225/75/57b2771540cc2
Access Rights
free_to_read
Comments
Sutherland, I. (2008, December). Industrial espionage from residual data: Risks and countermeasures. In Proceedings of the 6th Australian Information Security Management Conference (p. 165-170). Perth, Western Australia: School of Computer and Information Science, Edith Cowan University. Available here