Saturday, December 28, 2019

Cyber Espionage - 3202 Words

ABSTRACT The aim of this report is to examine the topic of cyber espionage. Incidents and threats of espionage committed using software tools have become frequent headlines in news stories in recent years, thus the existence of cyber espionage is undeniable. This report begins with an introduction of the topic, followed by a literature review. Moving on, two case studies specifically involving the use of Trojans and sniffers to commit espionage will be discussed. The scope of these case studies includes the attack mechanisms used and the countermeasures that could plausibly be adopted, as well as a discussion of each case. 1.0 INTRODUCTION Cyber espionage is the use of software tools to obtain secret or private information†¦show more content†¦An attacker can run malicious commands on an infected system to delete important files from the victim system, or format the entire disk. Attackers can also infect systems with a Trojan and use it to attack another pre-defined third party sy stem. Some Trojans have inbuilt keylogging capabilities to record keystrokes made by the victim on the infected system. These Trojans can be configured to automatically covertly email the log file containing the recorded keystrokes to a pre-defined email address. It is further possible to configure an autodestruct feature in the Trojan, so that it automatically gets destroyed at a pre-specified date, and hence leaves few traces behind. Such Trojans are capable of: - Stealing the contents of sensitive emails and documents - Recording passwords, credit card numbers, account information etc. - Stealing software programming code 2.3.2 Sniffers Sniffers are recording softwares that record and store data packets being sent across a network. Typically, sniffers can be used to capture, interpret and store data packets being sent across the network. These captured data packets can be studied and analyzed to understand solve network problems and keep track of network traffic. In espionage, sniffers are used to capture sensitive data being sent across the target network. Common espionage threats associated with sniffers include: - Passwords, bank accountShow MoreRelatedSecurity And Privacy : Cyber Espionage2380 Words   |  10 Pagesare their another strengths. 3.0 HACKERS AND THEIR MOTIVES: †¢ who is Attacking? ï‚ § Cyber Espionage ï‚ § Industrial Espionage ï‚ § Malicious Insider ï‚ § Cyber Criminals ï‚ § Personal Attacks †¢ Where are they from? Cyber Espionage are generally who targets on national and international spying to steal bank s sensitive information, They could be someone intentionally hired by government or organizations. Industrial Espionage were who target s on competitive companies, They could be hired by organization. MaliciousRead MoreCyber Espionage3573 Words   |  15 PagesCyber espionage:- Definition:- Cyber espionage (also spelled cyber espionage) â€Å" | involves the unauthorized probing to test a target computer’s configuration or evaluate its system defenses, or the unauthorized viewing and copying of data files. | † | â€Å" | uses computer or related systems to collect intelligence or enable certain operations, whether in cyberspace or the real world. | † | Cyber spying, or  cyber  espionage, is the act or practice of obtaining secrets without the permission ofRead MoreCyber Espionage4042 Words   |  17 PagesCyber Espionage In India Cyber espionage is an area that has recently attracted the attentions of Indian government and corporate houses alike. Both Indian government and corporate houses are the biggest loosers from cyber espionage. Sensitive information on national security and trade secrets and commercial information has been occasionally stolen through cyber espionage in India. India has been a victim of cyber espionage on many occasions where crackers operating in foreign jurisdictionsRead MoreCyber Espionage And Cyber Terrorism987 Words   |  4 Pagesthat 90% of companies worldwide admits on having being unprepared to protect themselves from any type of cyber-attacks. Large corporations like Target and Hope Depot has been target cyber security breach. That compromise thousands of employees and customers confidential information such as the social security number and credit cards accounts. But some small business weren’t so lucky, as cyber criminals took control of their entire network and completely destroying the whole company. Cybercrime willRead MoreCyber Espionage Attacks And Cyber Attacks1662 Words   |  7 PagesCyber Espionage Attacks This kind of attacks differ from other types of cyber-attacks as they have a different source from where the actual attack comes from, which is mainly from within the organization that is being attacked. It may be the most difficult type of attack in which organizations are able to defend themselves from, for example if the attack is emanating from an individual that holds a high rank within the company. Taking an example of the United States where the government has a processRead MoreCyber Espionage In China Essay767 Words   |  4 Pagesagencies were specifically targeted for cyber espionage. On July 9, 2013, Larry Wortzel, a member of the U.S.-China Economic and Security Review Commission testified before the House of Representatives, Committee on Energy and Commerce Subcommittee on Oversight and Investigation. He revealed the following assessment of China’s cyber activities against the United States. China is using its advanced cyber capabilities to conduct large-scale cyber espionage. China to date has compromised a rangeRead MoreEssay On Cyber Espionage In China750 Words   |  3 PagesChina concerning economic espionage has been viewed with both optimism and skepticism. It’s the first agreement of any substance on the issue, which is a hopeful sign. China doesn’t enjoy a reputation of carefully adhering to international agreements and there is doubt about whether the agreement will have any practical effect on China’s behavior. Since the early 2000s, cyber espionage issues have increasingly strained U.S.-China relations. All countries engage in espionage, but China is one of theRead MoreWhy Chinas Cyber Espionage Is A Threat1822 Words   |  8 Pages Why China’s Cyber Espionage is a Threat Cyber espionage is the act of attempting to penetrate an adversarial system for the purposes of extracting sensitive or protected data of either social or technical in nature. They are illicit activities that range from the commercial and economic to the political and strategic. They include small nuisance attacks to matters of high magnitude and importance like the national security and intelligence (Cornish 2012). Chinese cyber espionage has continued toRead MoreIs Huawei A Bad Reputation For Cyber Espionage? Essay700 Words   |  3 Pages3com led to Huawei not landing any major US contracts. This seems to be having a small domino effect in other countries also, examples being UK government offices scrapping all Huawei video intercom devices and even going so far as to review a UK cyber security centre run by Huawei, also, India’s state owned BSNL dropping Huawei from it’s suppliers after being advised by India’s own intelligence bureau, stating that Huawei ca n not be trusted with it’s sensitive telecom expansion. Similarly, AustralianRead MoreProblems with Ethiopia’s Unofficial Cyber Espionage Essay1038 Words   |  5 PagesEthiopia advanced in cyber espionage against its citizen’s. Innocent journalist from local and from other countries are being tortured, killed and imprisoned for speaking their opinions to the world. Ethiopia’s unofficial cyber espionage program targets innocent journalists and violates the United Nations-The International Covenant on Civil and Political Rights - Article 19 Freedom of Expression. The purpose of this paper will address problems with Ethiopia’s unofficial cyber espionage and evaluate the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.