You are here: Home Contents V16 N3 V16N3_Mukthapuram.html
Personal tools

Understanding Cyber Espionage

 

 

Full text
View
Purchase

Source
Journal of Information System Security
Volume 16, Number 3 (2020)
Pages 179195
ISSN 1551-0123
Authors
Vani Supriya Mukthapuram — Wells Fargo, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

Cyber espionage is a serious threat. In this tutorial we present an analysis of various cases of cyber espionage. The cases provide insight on the actors and the impact that the incident had on the organization or society at large. The various kinds of attacks are discussed and a final synthesis presents the best practices for managing cyber espionage attacks.

 

 

Keywords

Cyber Espionage, Best Practices, Cyber Threats.

 

 

References

Cassidy R. (August 31, 2018). Cyber Espionage and the US Elections: What are Russian Hackers Possibly Doing and How Can They be Stopped? Retrieved from https://www.exabeam.com/information-security/cyberespionage-and-the-us-elections/

Celestino O. (February 13, 2013). Watering Hole 101. Retrieved from https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/137/watering-hole-101

Coatesworth B. (July 6, 2014). Cyber espionage. Retrieved from https://www.slideshare.net/barryjcoatesworth/cyber-espionage-tinker-taylor-soldier-spy

Doman C. (July 7, 2016). The First Cyber Espionage Attacks: How Operation Moonlight Maze made history. Retrieved from https://medium.com/@chris_doman/the-first-sophistiated-cyber-attacks-how-operation-moonlight-maze-made-history-2adb12cc43f7

Financial Times (September 25, 2015). Obama and Xi in deal on cyber espionage. Retrieved from https://www.ft.com/content/0dbcab36-63be-11e5-a28b-50226830d644

Glitch.news (September 30, 2015). Cyber relationship between U.S., China, said to be at 'breaking point'. Retrieved from hhttps://www.glitch.news/2015-09-30-cyber-relationship-between-u-s-china-said-to-be-at-breakingpoint.html

Help Net Security (October 20, 2010). 10 tips for protecting against cyber espionage. Retrieved from https://www.helpnetsecurity.com/2010/10/20/10-tips-for-protecting-against-cyber-e spionage/

Kaspersky. (August 11, 2019). What Is an Advanced Persistent Threat (APT)? Retrieved from https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats

Limnell J. (July 2013). The Danger of Mixing Cyberespionage with Cyberwarfare. Retrieved from https://www.wired.com/insights/2013/07/the-danger-of-mixing-cyberespionage-with-cyberwarfare/

Macdonald (November 23, 2018). 5G, Huawei, and the Threat of China's Cyber Espionage. Retrieved from https://www.macdonaldlaurier.ca/5g-huawei-and-the-threat-of-chinas-cyber- espionage-new-mli-commentary/

Mavroeidis V. and Bromander S. (2017). Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence:

Najeeb QA. (May 5, 2013). Advanced Persistent Threat (APT). Retrieved from https://www.slideshare.net/mmubashirkhan/advanced-persistent-threat-apt

Paganini P. (December 11, 2017). 10 Biggest Cyber Espionage Cases. Retrieved from https://securityaffairs.co/wordpress/66617/hacking/cyber-espionage-cases.html

Petters J. (March 29, 2020). IDS vs. IPS: What is the Difference? Retrieved from https://www.varonis.com/blog/ids-vs-ips/Semantic Scholar. Retrieved from https://www.semanticscholar.org/paper/Cyber-Threat-Intelligence-Model%3A-An-Evaluation-of-Mavroeidis-Bromander/464a65b7c11c3e5858859766e1d172519a9762298

Shoebridge M. (November 2018). Chinese Cyber Espionage and the National Security Risks Huawei Poses to 5G Networks. Retrieved from https://macdonaldlaurier.ca/files/pdf/MLICommentary_Nov2018_
Shoebridge_Fweb.pdf

Sobers R. (March 29, 2020). 107 Must-Know Data Breach Statistics for 2020: Varonis. Retrieved from https://www.varonis.com/blog/data-breach-statistics/

Son Do. (June 21, 2018). Symantec: APT Chinese hacker group Thrip attacked US military satellite system & Southeast Asia. Retrieved from https://securityonline.info/symantec-apt-chinese-hacker-group-thrip-attacked-usmilitary-satellite-system-southeast-asia/

Swaine J. (July 13, 2018). Russians tried to hack Clinton server on day Trump urged email search. Retrieved from https://www.theguardian.com/us-news/2018/jul/13/russians-hillary-clinton-email-server-trump-indictmen

Townsend K. (January 7, 2019). The United States and China - A Different Kind of Cyberwar. Retrieved from https://www.securityweek.com/united-states-and-china-different-kind-cyberwar

Villanova.(January 22, 2020). What is Cyber Espionage? Retrieved from https://www.villanovau.com/resources/iss/cyber-espionage/

What is a Watering Hole Attack? - Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/31858/watering-hole-attack

Wilson M. (January 14, 2020). Cyber Attacks – A Detailed Guide, Different Types & How to Protect Against Them. Retrieved from https://www.pcwdld.com/cyber-attacks

Zetter K. (January 14, 2010). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved from https://www.wired.com/2010/01/operation-aurora/