Thursday, October 19, 2017

Cyber espionage



Cyber espionage is a threat that’s being heard more and more all the time and there have been a flood of stories in 2009 on this subject. Most of these incidents surround government bodies and agencies and therefore have not been a huge threat to most individual organizations. However, since cyber espionage has major implications for the government, it is a rising threat that must be closely monitored. 



Who performs these acts ?

Normally these are done by attack groups. Other than attack groups
·         state actors whom are acting on behalf of a governmental body
·          patriotic hackers
·          Hacktivists
·          Scammers
·          Data thieve
All of the above can be involved in cyber espionage.
Some attackers are out to steal intellectual property in order to damage businesses, others are going after sensitive government.

What are the objectives of cyber espionage?

·         Steal valuable trade secrets
·         Surveillance virus
·         Intellectual property
·         Confidential business strategies.
·         To eavesdrop on financial transactions
·         Disable industrial control systems.
·         Political reasons( nuclear, weapons)
·        Intimidation
Now let’s get to know the reasons behind these attacks.


What are the reasons of cyber espionage?

·         To gain knowledge or information of nations military operations
·         To identify the strength of other nations and to zero in on infrastructure
·         To have a competitive advantage against adversaries
·         To build defense and weaken other states
·         To generate revenue
·         To destroy critical infrastructure of victims
·         To gather intelligence of operations

Counter measures for cyber espionage

·         Patch management
·         Configuration management
·         Antivirus
·         Encryption
·         Firewalls
·         Intrusion Detection and Intrusion Prevention System
·         Biometric locks
·         Access control lists
·         Vulnerability and Risk Assessments
·         Authentication and Authorization










No comments:

Post a Comment

Test Images

Below images  are being used for the   Hashtag Generator and Content Authenticator research .