Explore chapters and articles related to this topic
Cyberspace and Emergency Management
Published in Michael L. Madigan, Handbook of Emergency Management Concepts, 2017
Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategic advantage and for psychological, political, and physical subversion activities and sabotage. More recently, cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter.
Security challenges in the transition to 4G mobile systems in developing countries
Published in Cogent Engineering, 2023
Fanuel Melak Asmare, Lijaddis Getnet Ayalew
Espionage or cyber spying is a type of cyberattack in which an unauthorized user sniffs sensitive or classified data or intellectual property for various reasons such as economic gain, competitive advantage, political purposes, or even religious belief and nationalism. In general, it can be defined as an intelligence-gathering method that is not publicly available and employs either human agents or advanced technological means (Deibert et al., 2009). The primary motivation for these attacks is monetary gain, but they can also be used in conjunction with military operations or as an act of cyber terrorism or cyber warfare. Cyber espionage disrupts public services and infrastructure, and it may also result in fatalities. The consequences become severe when it becomes part of a more extensive military or political campaign (Deibert et al., 2009).
Big Data Analytics in Cyber Security: Network Traffic and Attacks
Published in Journal of Computer Information Systems, 2021
In recent years, cyber security, cyber warfare, and cyber defense has played a crucial role in US systems. Cyber warfare consists of multiple unique threats that can be divided into cyber espionage (cyber spying) and cyberattacks. Cyberattacks include viruses, worms, malware, Trojans, botnets, malicious insiders, denial of service (DoS), distributed denial of service (DDoS), and server side injection (SSI), etc.1 Critical networks are one of the possible targets of cyber warfare. Cyber defense has also been emerging as a high priority can be categorized into passive cyber defense and active cyber defense. Passive cyber defense methods include virus detection, firewalls, patches, and threat detection, etc., but the increasing ineffectiveness in preventing threats and attacks through passive cyber defense has resulted in the emergence of active cyber defense, which has the synchronized and real-time capabilities to analyze, identify, and mitigate vulnerability and threats. Approaches to active cyber defense can be categorized into detection and forensics, deception, and attack termination.2,3