IT Security: Leadership Guide — Countering Cyberespionage
This IDC study, written for CIOs and senior security executives, describes the forms and methods of cyberespionage, which has risen to become a critically important security mission. Cyberespionage is now a widespread, tangible, and growing threat; thousands of organizations have been penetrated. Confidential information has been extracted, threatening competitive viability. Countering cyberespionage has become one of the principal security tasks for organizations that must protect their "knowledge capital," the foundation for the conduct of business for all 21st century enterprises. This study describes common attacker targets and attack patterns and gives essential guidance for organizational protection.
"Dealing with cyberespionage will require commercial firms to depend on outside sources of intelligence that originate from federal and state government sources that hitherto did not assist in protecting corporate information security centers," says Paul Strassmann, adjunct analyst with IDC's Research Network. "Such information should be used to supplement advice received from commercial security services firms."Please Note: Extended description available upon request.