Title

Industrial espionage from residual data: Risks and countermeasures

Document Type

Conference Proceeding

Publisher

School of Computer and Information Science, Edith Cowan University

Faculty

Computing, Health and Science

School

Computer and Information Science, Centre for Security Research

RAS ID

5581

Comments

Originally published as: Sutherland, I. (2008, December). Industrial espionage from residual data: Risks and countermeasures. In Proceedings of the 6th Australian Information Security Management Conference (p. 165-170). Perth, Western Australia: School of Computer and Information Science, Edith Cowan University. Original article available here

Abstract

This paper outlines the possible recovery of potentially sensitive corporate information from residual data. It outlines previous work on the recovery of information contained on second hand hard disks and handheld devices and discusses the risk of individuals conducting industrial espionage by targeting specific organizations. It examines the possible avenues for an attacker to obtain a storage device, then discusses the skill level required to extract information from the storage devices and considers the potential risk to an organization from this particular avenue of attack. The paper concludes by proposing a number of possible countermeasures to enable organizations to reduce the risk of this particular form of attack

DOI

10.4225/75/57b2771540cc2

Access Rights

free_to_read

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57b2771540cc2