07 March 2014To: Michael SohanFrom: Lindan Li LL, Ryan Flores RF, Yannik Azan-Smith YASubject: Cyber Security: - Cyber Espionage and its Global Implications We will analyze some issues that states/national organizations need to address, as security risks related to cyber espionage are prevalent in the information world. There are no permanent solutions to combat cyber espionage, so we will look at cyber espionage and discuss some ways we can effectively protect ourselves from the security risk of cyber espionage. Purpose and Scope The purpose of this document is to explain what cyber espionage is? We want to give you an idea of how cyber espionage works and how cyber espionage works. How does cyber espionage impact nation states/organizations? The purpose of this document on cyber espionage will be explained in the following three areas: • How do nation states/organizations target each other through cyber espionage? • How is cyber espionage implemented? • Strategies that can be used to reduce the effects of cyber espionage. What is cyber espionage? Cyber espionage is the act or practice of obtaining sensitive secrets without the owner's permission, from individuals, competitors, governments and enemies for personal, economic, political or military advantage using methods over the Internet, networks or individual computers through the use of cracking techniques and malicious software, including Trojan horses and spyware. It may be perpetrated entirely online from the computer desks of professionals in distant countries or it may involve home infiltration by conventional computer-trained spies and moles, or in other cases it may be the criminal work of malicious amateur hackers and software programmers . Like N. ..... middle of paper ......the deniability by eliminating any trace involving their cell or the country they work for. Third parties would host any command and control server in a network cloud or compromised machine owned by said third party. To achieve plausible deniability, the team would have to use the route connected to these servers, all data relating to any infected host and the infiltrated data would be encrypted. Strong authentications would be used to access these servers which would be rotated in and out of service periodically to avoid detection. Exfiltration There are numerous types of information that can be collected from infected hosts. Machine settings: Infected machines in an organization expose configurations, apps, and security present to protect the machine. This information will help in developing attacks tailored to the information extracted from the machine.
tags