3. Definition
The act or practice of obtaining
secrets without the permission of
the holder of the information.
Individuals, Competitors, Rivals, etc.
SSN, Bank Information, etc.
4. Ways to get Through
Methods on the Internet
Through networks or Individual
computers
Cracking Techniques
Malicious software
Trojan horses
Spyware
5. History
Spying is as old as human history
Sending people to spy on countries
Cyber espionage is a relatively new type of
intelligence gathering capability with various
strategies, tactics and tools
Our laws are having problems defining the
differences between espionage and attacking
Attacks are becoming harsher
Flame
6. Work Uses
Military
Used to spy on other countries
Security Field
Learn to block attacks
Learn about viruses
Business
Spy on competitors
7.
8. Wrap-up
The intentional use of computers or digital
communications activities in an effort to gain
access to sensitive information about an
adversary or competitor
Possible Individually or on a Network
Come a long way from peeking through
windows and listening in on phone calls
Can be used in many places for different
reasons
Canada and China are beginning a war
Groups, governments, and enemies… Why? For personal, economic, political, or military advantage
Has the purpose of gaining an advantage or selling the sensitive information for monetary reward.
We’ve moved away from the old ways of spying through people’s house windows and into their PC windows.
Flame- One of the most complex upcoming cyber attacks
Cyber espionage is far less expensive for all participants