![]() “Industrial” cyber espionage entails the theft of confidential business information, but, unlike economic cyber espionage, it is carried out by companies against foreign rivals without the support or assistance of a state. “Economic” cyber espionage is also state-sponsored but instead involves the theft of confidential business information from foreign companies. “Political” cyber espionage is usually state-sponsored (although it can be undertaken by nonstate actors such as terrorist groups) and describes the appropriation of political and military information belonging to state and nonstate actors during times of peace or armed conflict. Cyber espionage takes different forms depending upon the type of confidential data targeted, the actor undertaking this activity, and the context in which it occurs. In contrast, “remote access cyber espionage” is launched some distance from the targeted network, usually by exploiting pathways created by the Internet. “Close access cyber espionage” involves the collection of confidential data through the installation of hardware or software by malicious actors in close physical proximity to the targeted computer network or system. “Cyber espionage” describes the exploitation of cyberspace for the purpose of accessing and collecting confidential data. ![]() Because no internationally and legally recognized definition of cyber espionage exists, the following definitions of espionage will be used only to frame the subject under examination. Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage.
0 Comments
Leave a Reply. |