Target attacks in the context of industrial espionage.

Authors

  • Yu. Yakubivska Тернопільський національний економічний університет

Keywords:

industrial espionage, target attacks, software, cyber security, trade secrets

Abstract

The research paper is devoted to the processes of industrial espionage as a hidden form of receiving confidential competitors’ information. For this purpose, the conceptual apparatus of this phenomenon in the system of economic security is reviewed, the types of insider threats are highlighted, forms of industrial espionage are detailed. The article is concerned with the features of target attacks in the context of industrial espionage; trends in industrial espionage on a global level are analyzed; the key performance indicators of targeted attacks on the Internet are represented. The targeted attacks character in the context of industrial espionage is determined, focusing on generally accepted in the economic literature assumptions about their characteristics; the author introduced the relevant to the modern development of this sector adjustments. Based on results the conclusion about the nature of target attacks is formulated, the necessity of reagents and preventive measures combining on ways of their influence counteracting on macro and micro levels is emphasized.

Author Biography

Yu. Yakubivska, Тернопільський національний економічний університет

к.е.н., старший викладач кафедри фінансово-економічної безпеки

References

Отчет об угрозах безопасности в Интернете за 2013 год: [Електронний ресурс] / Публикации службы Securuty Response. - 2013. – Том 18. - Режим доступу: http://www.symantec.com/ru/ru/security_response/publications/threatreport.jsp?inid=ru_ghp_thumbnail3_istr-2013

Унікальний випадок промислового шпигунства виявлений фахівцями ESET : [Електронний ресурс] / Інформативне місце КЕРНпр. – 2012. - Режим доступу: http://kernpro.info/unikalnyj-vypadok-promyslovoho-shpyhunstva-vyjavlenyj-fahivcjamy-eset/

Nasheri H. Economic Espionage and Industrial Spying / Nasheri Hedieh . – Cambridge: Studies in Criminology, 2004. - 288 р.

The Sykipot Attacks : [Електронний ресурс] / Symantec. – 2012. - Режим доступу: http://www.symantec.com/connect/blogs/sykipot-attacks

Visual Analytics for Securitiy. Vis-sense. : [Електронний ресурс] .- Режим доступу: http://www.vis-sense.eu/Project/

Worldwide Observatory of Malicious Behaviors and Attack Threats : [Електронний ресурс] / Wombat. – 2012 .- Режим доступу: http://www.wombat-project.eu/

Issue

Section

Articles