Submit Search
Upload
Computer Forensics And Investigating Corporate Espionage
•
0 likes
•
7 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i6/IRJET-V10I6154.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Axxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
File000154
File000154
Desmond Devendran
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
IRJET Journal
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
Adriana Sanford
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
Recommended
Axxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
File000154
File000154
Desmond Devendran
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
INTERPLAY OF ARTIFICIAL INTELLIGENCE ON TRADE SECRETS
IRJET Journal
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
Adriana Sanford
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
IBM X-Force.PDF
IBM X-Force.PDF
Ban Selvakumar
An Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
Ethics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
bentidiane21
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Alisha Deboer
A 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron Mountain
Pim Piepers
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
Joseph Lopez, M.ISM
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
John Rhoton
Security In an IoT World
Security In an IoT World
syrinxtech
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
Martin Jordan
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Computer Forensics And Investigating Corporate Espionage
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
IBM X-Force.PDF
IBM X-Force.PDF
Ban Selvakumar
An Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
Ethics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
bentidiane21
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Alisha Deboer
A 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron Mountain
Pim Piepers
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
Joseph Lopez, M.ISM
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
John Rhoton
Security In an IoT World
Security In an IoT World
syrinxtech
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
Martin Jordan
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
Robots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
Similar to Computer Forensics And Investigating Corporate Espionage
(20)
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
IBM X-Force.PDF
IBM X-Force.PDF
An Empirical Study on Information Security
An Empirical Study on Information Security
Ethics and legislation in the it industry
Ethics and legislation in the it industry
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
A 5 step guide to protecting backup data by Iron Mountain
A 5 step guide to protecting backup data by Iron Mountain
Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
Security In an IoT World
Security In an IoT World
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
Robots in The Chemical Industry
Robots in The Chemical Industry
Cybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Recently uploaded
(20)
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Computer Forensics And Investigating Corporate Espionage
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | June 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1015 Computer Forensics And Investigating Corporate Espionage Prof. Mahesh Rajaram Kudalkar Assistant Professor, D.G. Ruparel College of Arts, Science and Commerce, Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Research studies the usefulness of computer forensics while investigating corporate espionage, With the help of past cases this research explains the need of Economic Espionage Act of 1996 and recommends the critical safety measures to be implemented in any organization to prevent the theft of trade secrets or intellectual property. Key Words: Computer Forensics, Espionage, Economic Espionage Act 1996, Digital Information, Theft, Commercial Secrets 1.INTRODUCTION Every company in each business is vulnerable to the rising threat of corporate espionageandtheftofproprietarysecret. We work to protect our client’s intellectual property. Corporate espionage is on the rise globally, and businesses and nations are employing whatever moral or immoral tactics necessary to gain the information that will give them a competitive edge or financial advantage over the different competitive organizations and business. Corporate espionage is the stealthy and illegal method of investigating competitors businesses and to gain a business advantage. A trade secret, such as a private product specification, a secret recipe, or a roadmap of corporate goals, could be the subject of a criminal investigation. Industrial spies frequently just gather any information that their company can use to its benefit. An industrial spy could pose a threat from within the corporate organisation, for exampleiftheywerehiredby the corporation with the expresspurposeofspyingora unhappy employee who sells information for personal gain or revenge. Social engineering techniques, such as persuading an employee into disclosing their passwords or credentials, are another way that spies may intrude. Spies sometimes needs to physically breach the target organization's security and investigatethepremises,whenit is very hard to compromise a employee or obtain a information. In such cases, a spy might search for critical information in waste baskets or copy files from hard drives of unattended computers. now a days, theintrusionhappens through the corporate network. The company's network is typically targeted via an attack that involves breaching the firewall to get initial network access, followed by the deployment of an advanced persistent threat (APT) or Remote Access Trojan (RAT) to continue data theft. If a hacker gains access to an employee's cell phone by leaving the phone in a boardroom, the ability of cell phones to record and broadcast can also be exploited, for example, monitoring a meeting remotely. Now a days different recording devices are also available in a variety of items including eyeglasses, pens and USB sticks. 2 ORIGINS The history of economic and industrial espionage is extensive. Some consider Father Francois Xavier fromChina, who revealed porcelain production techniques to Europe in 1712, to be the first and earliest instance of industrial espionage. Historically many cases have happened of industrial espionage between Britain and France. Credit to Britain's emergence as an "industrial creditor", the second decade of the 18th century recorded the emergence of a large-scale statesponsored effort to take Britishindustrialtechnologyto France. Witnesses confirmed both the persuade the trades persons abroad and the placing of apprentices in England. Protests by ironworkersand steelworkersagainsttheexport of skilled industrial workers. English legislation aimed at preventing this method of economic and industrial espionage, although this did not prevent Samuel Slater from bringing British textile technology to the United States in 1789, to catch up with the new technology of the Britain, the government of US in the eightieth and nineteen centuries actively encouraged intellectual piracy. 3. TYPES OF INDUSTRIAL ESPIONAGE The term "industrial espionage" refers to a variety of methods, including: • Visiting a competitor'sproperty withoutauthorizationin order to access their files. • Posing as a worker for a rival company to get corporate trade secrets and other confidential information. • Listening in on a rival. • Breaking into a rival's computers. • Launching a malware attack on a rival's website. But not every corporate espionage is dramatic. Much can be as simple as an employee transferring trade secrets from
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | June 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1016 one company to another a disgruntled employee, or an employee who has been fired by a company and takes information with them such as customers records, company data or secret etc, which they shouldn't. Then there is competitor’s intelligence which is, also called as in information security terms, the white-hat hacking of corporate businesses. Competitive intelligence companies say they're legal and have authority, to gather and analyse information which is largely public that can affect their clients' security mergersandacquisitions,or new government regulations, blogs and social media. Theymight research the background of a executive and they will saynot digging up any dirt, but to try to understand their motives and to predict their behaviour in given situation. That's everything in the theory, though sometimes, the line separating these methods from criminal intend can be very thin. It's also true that not all corporate espionage involves turning employees or assigning spies on other businesses. Often governments get intothegametoo,especiallydifferent countries where many businesses are state-owned and managed solely by the state the administration views necessary economic development as an important national goal. As a result, other governmentsdrawntosucheconomic development from various degrees, one of the main motivations PresidentTrumphasgivenforescalatinga trade war with China has been to fight against the theft of American trade secrets. When states are involved in the process of espionage, the term used here is economic espionage. 3.1 Why Companies Don’t Prosecute? Corporate espionage may involve inside information and is very hard to prove in the court of law. Because of this, many companies don’t prosecute. Reasons for this include: ▪ Differing laws in each country and foreign governments making it difficult to hold anyone responsible ▪ Fear of reputation damage or damage to the company’s financial status if it becomes public knowledge that they were victimized All the customers knows that a company is responsible for the security of its their data, so a leak or a theft of that data can cause legal issues and fines, and severe reputation and PR issues. 3.2 Case WhereKodakTradeSecretsWereStolen!!! Harold Worden was a employee of the Kodak Corporation retired from his duty after a 30 years of his employment. He managed the project for the new product known as the 401 machine for the final five years of his employment at Kodak. This was the new machine explicitly design to produce the clear plastic base in low cost which was used in consumer film. The base was lined with blend using a proprietary formula that improves the quality of the photographs. When Worden retired, not only he took hundreds of documents marked as "confidential" about the 401 machines development, but also he recruited his replacement to continue providing proprietary information from Kodak Corporation. A Kodak representative said the numerous plans, drawings and important documents which was taken by Worden were worth millions of dollars to the company, even though Worden stated that by the time of his arrest had only received around$25,000forsellingthatinformation.Therisk to the market share because of Harold Worden's scheme could have been in the billions of dollars. In August 1997, Harold entered a plea of guilty to one felony count of transporting stolen goods. He was sentencedtoone- year imprisonment,threemonthsofhomeconfinement,three years of probation, and a fine of $30,000 in November 1997. Kodak has a lawsuit pending against him for financial recovery. A week after Harold was given his punishment, Kodak accused a different retired worker of giving trade secrets to what was then 3M's photographicfilmsubsidiaryinFerraina, Italy. 4. UNITED STATES OF AMERICA [ECONOMIC ESPIONAGE ACT OF 1996] Economic Espionage Act of 1996istheU.S.federal lawwhich control corporate espionage. The law made stealing proprietary secrets (as opposed to classified or national defense information) a federal crime for the first time in history, and structures a detailed definition of what comprise a trade secret. Additionally, it lists the harsh punishments for corporate espionage, including fines of millions of dollars and lengthy prison terms. Most of the heaviest legal penalties are metedouttoanyonewhodivulge trade secrets to foreign businesses or governments, and indeed the very first trial sentence under the law involved a Boeing plane engineer who had sold trade secrets to China. It is significant to highlight that not all instancesofcorporate espionage result in criminal charges. The US Department of Justice has issued guidelines on which cases to pursue, and they are as follows: • The scope of the criminal intend, including evidence of involvement by a foreign establishment, or a foreign actor. • The extent of the organization's secret owner's economic depreciation
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | June 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1017 • What kind of trade secret was stolen • The efficiency of the civil remedies that are accessible • The potential value of the prosecution But keep in mind just because an action doesn't merit for prosecution doesn't make it legal, and violations can be served as the basis for lawsuits in civil court. Additionally, several states have corporate espionage statutes that are stricter than federal law; for example, the famous "pretexting" case involving Hewlett-Packardinvolvedillegal exploits. under U.S. federal law but was in California's state law, and resulted in about $14 million fine. 5. USE OF COMPUTER FORENSICS IN INVESTIGATIONS In civil cases or corporate investigations digital forensics is used for the electronic discovery or eDiscovery. Forensic investigation methods are also similar totheone'swhichare used in criminal investigations, mostly with different legal requisite and barrier. Outside the court of law, with the help of digital forensics evidence can be found in corporate investigations. The goal of digital forensics is to track down the evidence of a criminal actions from a digital source. However, the varying range of data stored in digital devices can help with the investigation. Attribution Logs from a computer and other metadata can be used to understand actions of an individual. For example, personal data residing on a computer drive can be used to identify its owner. Alibis and statements Information provided by involved parties such as defendant or witnesses can be cross checked with digital evidence. For example, When mobile phone records of the person the perpetrator claimed to be out of town at the time were reviewed during the inquiry into Amit's murder The alibi was later discovered to be falsified. Intent Cyber Forensics not only help us to find evidence of a crime being committed, but investigations can also be used to prove the intent of the criminal. For example, the Internet history of convicted killer included references to a website discussing How to kill people. Evaluation of source The origin of a specific piece of data can be determined using file meta-data.Forinstance,olderversionsofMicrosoft Word included a Global Unique Identifier in their files that could be used to determine the computer on which the file was originally written. Proving if a file being examined was produced on the digital device or obtained from somewhere else which can be very important in the court proceedings. Document authentication We also need to keep in mind meta data linkedwithdigital documents can be easily modified (by changing the computer clock time you can change the creation date of a file or document). Document authentication depends on detecting and identifying this false information. 5.1 Network data reveals theft of trade secrets Engineer Xiaolang ZhangworkedforApple'sgroupthatdealt with electric automatic vehicles. He had been working for the company for two and a half years when he made the announcement that he would be leaving and going back to China to care for his old mother. He disclosed to his management that he would be working for a Chinese maker of electric vehicles. The management was skeptical after the conversation. Company security opened an inquiry. The assessment of Zhang's network activities most frightened them after they had searched his two work phones and laptop. According to the network data, Zhang's activity peaked in the days before he resigned, reaching a two-year high. There were mass searches and selective downloading of many pages of data. extracted from password-protected databases that he had access to, Zhang acknowledged stealing company information when questioned. Zhang was charged with theft of trade secrets after the case was forwarded to the FBI. A branch of digital forensics is network forensics.Inorder to trace or monitor network activity, it entails the examination of log data from servers and other networking appliances (such as firewalls,routers,andintrusiondetectionsoftware). Network forensics is one of the go-to technologies for intrusion and breach detection, thus attorneys with cyber law practices have grown extremely familiar with it. Network forensics may entail ongoing traffic monitoring or retrospective analysis. Data analytics methods are widely employed since the amount of data collected can be very large. Network forensics used to be a very uncommon practice. Only a small number of companies have their network logging functions enabled in order to minimize the demand for storage hardware. Even fewer still kept their logs long enough for investigators to find them useful. As businesses have gotten smarter and more vigilant about cyber security, practices have altered. The Zhang case highlights how the accessibility of network data creates options to look into user behavior in situations that are not cyber-related, such as a theft of trade secret issue. Network logs can be examined, just like in the Zhang case, to spot large-scaledata
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | June 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1018 transfers or deletions as well as other questionable user behavior. 5.2 Wearable sensors revel data. In 2015 the murder of Connie Dabate in her residence. Her husband Richard gave a detailed account of what happened that day, stating that he came home after getting a warning from an alarm, according to the arrest orderforhim.Richard continued by stating that he was tortured and rendered helpless by an intruder after entering his home. When Connie arrived home from the gym, the intruder shot and killed her. Police were able to demonstrate that Connie was present in the home during the time Richard claimed she was at the gym using data from Connie's Fitbit. The Fitbit's data showed that Connie stopped moving a minute before the home alarm sounded. Wearable technology, such as Fitbits, uses GPS to track location as well as activities like step count, distance travelled, and sleep duration. The hardware is set up to synchronize data with cloud or social media services,aswell as programs on cellphones and personal computers. Both of these sources can be used to create evidentiary collections utilizing common digital forensics tools and methods. 5.3 Data from vehicle infotainment system can be useful. In a 2017 article from Digital ForensicsMagazinex,a hit-and- run collision involving a black SUV with no lights on is described. After colliding with a vehicle and a group oftrees, the SUV continued on its way. Police found a matching SUV to the description. Police were able to ascertain several things after downloading data from the SUV's on-board diagnostics, infotainment, and telematics systems,including that the SUV had passed the crash site at or near the timethe crash had occurred, that the lights had not been on, and that it had been put in reverse and forward several times shortly after the crash in close proximity to the damaged trees. Police also discovered other evidence linking the SUV's journey. As a source of data for investigations, cars are fast approaching the level of personal computers or cellphones. Additionally, some automobiles come with web browsers which store cookies, history, and cache data. Data from programs that are incorporated by the manufacturer, like Facebook, may also be included. It is possible to recognize gadgets that have been connected to a vehicle's computer, much like with personal computers. In the near future, it could also be feasible to retrieve video data andhistoryfrom the autonomousdrivingtechnologiesthatarenowappearing in automobiles. A growing area of digital forensics expertise is vehicle forensics. The majority of the effort to date has been focused on a single forensic instrument, but the tool'screatorsassert that it is compatible with more than ten thousand other truck and car brands. Automobile manufacturers, auto insurance investigators,automobilerental businesses,police enforcement, and intelligence organizations are already active users of vehicle forensics. 6. CONCLUSION AND RECOMMENDATIONS Businesses lose an estimated $100 billion a year due to corporate espionage: the theft of corporatesecretsforprofit. To make matters worse, the biggest risk to a company isn’t from an outside entity–instead, it is internal parties who pose the greatest threat. Whetherit’sdisgruntled employees, or those looking to make extra money selling trade secrets, corporate espionage is a serious issue for businesses. Fortunately, there are ways to mitigate the possibility of such an issue from occurring. Minimize and Safeguard Physical Documentation- Mostly the reason of corporate espionageoccursthrough the theft of a physical document, hard disk, pen drive,SSDor other type of physical information, not throughhacking.Due to this, it becomes very important to control and managethe levels of physical documentation that exist within a private company. Never simply throw away important documents– always shred them before disposal witha highquality,cross- cut paper shredder. Protect Digital Information- Digital theft makes upone quarterofcorporateespionage cases, so it is important to protect digital information by installing and regularly updating security programs and protocols. This may include firewalls, antivirus and anti- Trojan software. Only allow trusted IT specialists to access servers, and change passwords regularly to prevent them from being cracked. Besides sensitive information and proprietary knowledge, make sure that any electronically stored intellectual e-properties, such as patents, copyrights or trademarks, are protected as well. Screen Prospective Employees and Develop Non- Compete/Non-Disclosure Contracts- Be thoughtful in your hiring practices, and perform background checks on employees who will be responsible for maintaining or accessing sensitive data. Maintain open lines of communication with employees,whichmayhelpyou to detect disgruntled employees who would be willing to commit corporate espionage. Having employees sign a non- compete and non-disclosure contract may not prevent corporate espionage from occurring, but will giveyoustrong recourse to seek action against an individual who commits an infraction.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | June 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1019 Rely on the Expert Knowledge of a Data Forensics Team- You’ve worked hard to make your business what it is now, imagine all that hard work going to waste after a case of corporate espionage reveals all of your mostlucrativeand valuable secrets and proprietary knowledge. Do not let this happen to you enlist the assistance of Data Forensics, who can help to ensure your valuable information is protected. Our data security professionals can help train employees on data security and best practices for preventing corporate espionage, and, should the worst occur ACKNOWLEDGEMENT This Research is helpful for students who want to pursue a career in Computer Forensics, the research enlightens them on the practical application of computer forensics in legal proceedings. REFERENCES Guide to Computer Forensics andInvestigation,Bell Nelson, Amelia Phillips, Christopher Steuart 4th Edition Cengage Learning. Computer Forensics A Pocket Guide, NathenClarke, I.TG. vernance Publishing Computer Forensics: Computer Crime Scene Investigation, John R. Vacca 2nd Edition, Charles River Media. The Field Guide for Corporate Computer Investigations by Chad Steel www.securonix.com https://www.wrc.noaa.gov/wrso/security_guide.ht m BIOGRAPHIES Prof. Mahesh R Kudalkar M.Sc. Information Technology Asst. Professor, Mumbai
Download now