COMPUTER SECURITY 5
the primary tool that has been used to hack into unattended computers in business offices. Some
economic computer perpetrators may take advantage of the vulnerabilities of other computer
software. The perpetrators use computer spyware and malware to predict the trade secrets
concerning the customer plans and other trade secrets of a business future. Some devices like
distributed denial service (DDoS) targets compromised computer systems to interfere with the
flooding requests on the target computer systems so that it may both shut down and keep off users
from accessing services. The increased accessibility to computer internet networks has been the
ideal tool for perpetrators to carry out a cyber-attack, (Thonnard, et.al 2012)
The economic espionage can be combated through the formulation of strict rules and
legislation against the perpetrators of intellectual property theft. Enforcing domestic laws
enforcement and carrying out public campaign and awareness outreach is the best outreach
practices for combating such malpractices. Task force in collaboration with other private and
public cyber-security units have been formed and reinforced to look into perpetration and
intellectual sabotage issues. Hefty fines and punishment have been put in place to be carried out
on the offenders. Many nations and private and public business organizations have collaborated
but financially and socially to combat the crimes.
Some departments like para-military CISF are carrying out undercover operations and
programs to protect specific strategic or specific installations. Such actions are accurately carried
out at sensitive places like government departments, airports, and aerospace among others. The
undercover security agents have been trained to build trust among themselves and to catch nuances
through spy methods in various strategic installations. The agents carry out secretive interviews
and surveillance operations to ascertain any suspected cases of espionage and sabotage, (Murphy,
2016)