Understanding Cyber Espionage
Full text | |||
Source | Journal of Information Systems Security Volume 16, Number 3 (2020)
Pages 179–195
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Vani Supriya Mukthapuram — Wells Fargo, USA | ||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
Cyber espionage is a serious threat. In this tutorial we present an analysis of various cases of cyber espionage. The cases provide insight on the actors and the impact that the incident had on the organization or society at large. The various kinds of attacks are discussed and a final synthesis presents the best practices for managing cyber espionage attacks.
Keywords
Cyber Espionage, Best Practices, Cyber Threats.
References
Cassidy R. (August 31, 2018). Cyber Espionage and the US Elections: What are Russian Hackers Possibly Doing and How Can They be Stopped? Retrieved from https://www.exabeam.com/information-security/cyberespionage-and-the-us-elections/
Celestino O. (February 13, 2013). Watering Hole 101. Retrieved from https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/137/watering-hole-101
Coatesworth B. (July 6, 2014). Cyber espionage. Retrieved from https://www.slideshare.net/barryjcoatesworth/cyber-espionage-tinker-taylor-soldier-spy
Doman C. (July 7, 2016). The First Cyber Espionage Attacks: How Operation Moonlight Maze made history. Retrieved from https://medium.com/@chris_doman/the-first-sophistiated-cyber-attacks-how-operation-moonlight-maze-made-history-2adb12cc43f7
Financial Times (September 25, 2015). Obama and Xi in deal on cyber espionage. Retrieved from https://www.ft.com/content/0dbcab36-63be-11e5-a28b-50226830d644
Glitch.news (September 30, 2015). Cyber relationship between U.S., China, said to be at 'breaking point'. Retrieved from hhttps://www.glitch.news/2015-09-30-cyber-relationship-between-u-s-china-said-to-be-at-breakingpoint.html
Help Net Security (October 20, 2010). 10 tips for protecting against cyber espionage. Retrieved from https://www.helpnetsecurity.com/2010/10/20/10-tips-for-protecting-against-cyber-e spionage/
Kaspersky. (August 11, 2019). What Is an Advanced Persistent Threat (APT)? Retrieved from https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats
Limnell J. (July 2013). The Danger of Mixing Cyberespionage with Cyberwarfare. Retrieved from https://www.wired.com/insights/2013/07/the-danger-of-mixing-cyberespionage-with-cyberwarfare/
Macdonald (November 23, 2018). 5G, Huawei, and the Threat of China's Cyber Espionage. Retrieved from https://www.macdonaldlaurier.ca/5g-huawei-and-the-threat-of-chinas-cyber- espionage-new-mli-commentary/
Mavroeidis V. and Bromander S. (2017). Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence:
Najeeb QA. (May 5, 2013). Advanced Persistent Threat (APT). Retrieved from https://www.slideshare.net/mmubashirkhan/advanced-persistent-threat-apt
Paganini P. (December 11, 2017). 10 Biggest Cyber Espionage Cases. Retrieved from https://securityaffairs.co/wordpress/66617/hacking/cyber-espionage-cases.html
Petters J. (March 29, 2020). IDS vs. IPS: What is the Difference? Retrieved from https://www.varonis.com/blog/ids-vs-ips/Semantic Scholar. Retrieved from https://www.semanticscholar.org/paper/Cyber-Threat-Intelligence-Model%3A-An-Evaluation-of-Mavroeidis-Bromander/464a65b7c11c3e5858859766e1d172519a9762298
Shoebridge M. (November 2018). Chinese Cyber Espionage and the National Security Risks Huawei Poses to 5G Networks. Retrieved from https://macdonaldlaurier.ca/files/pdf/MLICommentary_Nov2018_
Shoebridge_Fweb.pdf
Sobers R. (March 29, 2020). 107 Must-Know Data Breach Statistics for 2020: Varonis. Retrieved from https://www.varonis.com/blog/data-breach-statistics/
Son Do. (June 21, 2018). Symantec: APT Chinese hacker group Thrip attacked US military satellite system & Southeast Asia. Retrieved from https://securityonline.info/symantec-apt-chinese-hacker-group-thrip-attacked-usmilitary-satellite-system-southeast-asia/
Swaine J. (July 13, 2018). Russians tried to hack Clinton server on day Trump urged email search. Retrieved from https://www.theguardian.com/us-news/2018/jul/13/russians-hillary-clinton-email-server-trump-indictmen
Townsend K. (January 7, 2019). The United States and China - A Different Kind of Cyberwar. Retrieved from https://www.securityweek.com/united-states-and-china-different-kind-cyberwar
Villanova.(January 22, 2020). What is Cyber Espionage? Retrieved from https://www.villanovau.com/resources/iss/cyber-espionage/
What is a Watering Hole Attack? - Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/31858/watering-hole-attack
Wilson M. (January 14, 2020). Cyber Attacks – A Detailed Guide, Different Types & How to Protect Against Them. Retrieved from https://www.pcwdld.com/cyber-attacks
Zetter K. (January 14, 2010). Google Hack Attack Was Ultra Sophisticated, New Details Show. Retrieved from https://www.wired.com/2010/01/operation-aurora/