Cyber Espionage Technical Presentation By Brianna White Roadmap
Cyber Espionage Technical Presentation By: Brianna White
Roadmap v. Definition v. In Field Uses v. Getting Through v. Latest News In Cyber Espionage v. History v. Summary ØPast ØPresent v. References ØFuture
Definition v. The act or practice of obtaining secrets without the permission of the holder of the information. ØIndividuals, Competitors, Rivals, etc. ØSSN, Bank Information, etc.
Ways to get Through v. Methods on the Internet ØThrough networks or Individual computers v. Cracking Techniques v. Malicious software ØTrojan horses ØSpyware
History v. Spying is as old as human history ØSending people to spy on countries v. Cyber espionage is a relatively new type of intelligence gathering capability with various strategies, tactics and tools ØOur laws are having problems defining the differences between espionage and attacking v Attacks are becoming harsher ØFlame
Work Uses v. Military ØUsed to spy on other countries v. Security Field ØLearn to block attacks ØLearn about viruses v. Business ØSpy on competitors
a n i h C. s s k v c a a t d t a A n e g Ca a n o i p s E r e b Cy
Wrap-up v. The intentional use of computers or digital communications activities in an effort to gain access to sensitive information about an adversary or competitor v. Possible Individually or on a Network v. Come a long way from peeking through windows and listening in on phone calls v. Can be used in many places for different reasons v. Canada and China are beginning a war
References • http: //itlaw. wikia. com/wiki/Cyber_espionage • http: //siptrunking. tmcnet. com/topics/security/articles/479 27 -cyber-espionage-targets-sensitive-data. htm • https: //www. bit 9. com/resources/webinars/thefuture-of-cyber-espionage-dont-get-burned-byflame-and-other-advanced-persistent-threats/ • http: //video. intelligencer. ca/video/featured/late st/1569514787001/chinese-cyberespionage/2181272403001
- Slides: 9