You are here: Home Contents V16 N3 V16N3_Mukthapuram.html
Personal tools

Understanding Cyber Espionage



Full text

Journal of Information System Security
Volume 16, Number 3 (2020)
Pages 179195
ISSN 1551-0123
Vani Supriya Mukthapuram — Wells Fargo, USA
Information Institute Publishing, Washington DC, USA




Cyber espionage is a serious threat. In this tutorial we present an analysis of various cases of cyber espionage. The cases provide insight on the actors and the impact that the incident had on the organization or society at large. The various kinds of attacks are discussed and a final synthesis presents the best practices for managing cyber espionage attacks.




Cyber Espionage, Best Practices, Cyber Threats.




Cassidy R. (August 31, 2018). Cyber Espionage and the US Elections: What are Russian Hackers Possibly Doing and How Can They be Stopped? Retrieved from

Celestino O. (February 13, 2013). Watering Hole 101. Retrieved from

Coatesworth B. (July 6, 2014). Cyber espionage. Retrieved from

Doman C. (July 7, 2016). The First Cyber Espionage Attacks: How Operation Moonlight Maze made history. Retrieved from

Financial Times (September 25, 2015). Obama and Xi in deal on cyber espionage. Retrieved from (September 30, 2015). Cyber relationship between U.S., China, said to be at 'breaking point'. Retrieved from h

Help Net Security (October 20, 2010). 10 tips for protecting against cyber espionage. Retrieved from spionage/

Kaspersky. (August 11, 2019). What Is an Advanced Persistent Threat (APT)? Retrieved from

Limnell J. (July 2013). The Danger of Mixing Cyberespionage with Cyberwarfare. Retrieved from

Macdonald (November 23, 2018). 5G, Huawei, and the Threat of China's Cyber Espionage. Retrieved from espionage-new-mli-commentary/

Mavroeidis V. and Bromander S. (2017). Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence:

Najeeb QA. (May 5, 2013). Advanced Persistent Threat (APT). Retrieved from

Paganini P. (December 11, 2017). 10 Biggest Cyber Espionage Cases. Retrieved from

Petters J. (March 29, 2020). IDS vs. IPS: What is the Difference? Retrieved from Scholar. Retrieved from

Shoebridge M. (November 2018). Chinese Cyber Espionage and the National Security Risks Huawei Poses to 5G Networks. Retrieved from

Sobers R. (March 29, 2020). 107 Must-Know Data Breach Statistics for 2020: Varonis. Retrieved from

Son Do. (June 21, 2018). Symantec: APT Chinese hacker group Thrip attacked US military satellite system & Southeast Asia. Retrieved from

Swaine J. (July 13, 2018). Russians tried to hack Clinton server on day Trump urged email search. Retrieved from

Townsend K. (January 7, 2019). The United States and China - A Different Kind of Cyberwar. Retrieved from

Villanova.(January 22, 2020). What is Cyber Espionage? Retrieved from

What is a Watering Hole Attack? - Definition from Techopedia. Retrieved from

Wilson M. (January 14, 2020). Cyber Attacks – A Detailed Guide, Different Types & How to Protect Against Them. Retrieved from

Zetter K. (January 14, 2010). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved from