Cyyber Espionage And Cyber Security

1095 Words3 Pages

arch 07, 2014

To: Michael Sohan

From: Lindan Li LL, Ryan Flores RF, Yannik Azan-Smith YAS

Subject: Cyber Scurity:- Cyber Espionage and its global implications

We are going to analyze some problems that Nation States/Organizations face, as cyber espionage security risks are prevailant in the information world. There is no permanent solations to combat cyber espionage, as such we will be looking at the latter, and discussing some ways we can effectively protect ourselves from the security risk of cyber espionage.

Purpose and Scope

The purpose of this paper is to explain what is cyber espionage? We want to give you an idea of the way cyber espionage works and how cyber espionage works. How does cyber espionage affect Nation States/Organisation? The scope of this paper about Cyber Espionage will be explained in the three following areas:

• How Nation States/Organisation target each other through cyber espionage?
• How cyber espionage is implemented?
• Strategies that can be utilized to reduce the effects of cyber espionage.

What is cyber espionage?

Cyber espionage, is the act or practice of obtaining sensitive secrets without the permission of the holder of the, from individuals, competitors, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on basis in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.

How N...

... middle of paper ...

...le deniability by eliminating any trace that implicates their cell or country they work for. Third parties would host any command and control severs in a network cloud or compromised machine own by said third party.
To achieve plausible deniability the team would have to use route connected to these servers, all data regarding any infected host and the infiltrated data would be encrypted. Strong authentications would be used to access these servers which would be rotated periodically in and out of service to avoid detection.

Exfiltration

The types of information that can be collected from infected hosts are numerous.
Machine settings- Infected machines in an organization expose configurations, apps, and security that are present to protect the machine. This information will help in the development of attacks tailored to the information extracted from the machine.

More about Cyyber Espionage And Cyber Security

Open Document