Academic literature on the topic 'Cybersecurity Espionage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Espionage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity Espionage"

1

Alashi, Shahad A., and Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 15, 2020): 97–112. http://dx.doi.org/10.26735/eint7997.

Full text
Abstract:
The study discusses the role of governance in the sustainability of cybersecurity for business corporations. Its objectives focus on tracking technology developments and their impact on industrial espionage attacks and theft of industrial intellectual property. It also identifies the indicators and effects of such espionage and theft on business corporations. The study is based on the content analysis methodology for analyzing intellectual production pertinent to cybersecurity governance and industrial cyber espionage. The study concludes that relying on information and communication technology without adopting a cybersecurity integrated approach including technical, organizational, and social measures leads to the disclosure of a corporation’s trade secrets by unauthorized persons. Moreover, loss of competitive advantage and damage to the corporate’s financial affairs and reputation may occur. The most important indicators of the study predicting dangers affecting business corporations are the absence of a strategic plan for cybersecurity, inefficient programs for training and cybersecurity awareness, and a lack of secure infrastructure. The vulnerability of business corporations to breaches has many implications. The study shows that cybersecurity governance in turn prepares the corporation to encounter risks targeting its trade secrets. The study finds that there are three integrated elements processes, technology, and persons, for establishing an effective cybersecurity governance program. Accordingly, the main aspects of cybersecurity governance can be employed. The study highlights a range of challenges that business corporations may face when implementing the cybersecurity governance program. These challenges are related to cybersecurity strategy, unified processes, implementation and accountability, senior leadership control, and resources.
APA, Harvard, Vancouver, ISO, and other styles
2

Himanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 2 (April 30, 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.

Full text
Abstract:
Provides an overview of the complex landscape of cybersecurity law, highlighting the challenges and legal frameworks aimed at safeguarding digital assets and privacy rights in an increasingly interconnected and digital world. the evolving nature of cybersecurity threats, the legal principles underpinning cybersecurity regulation, and the tensions between security imperatives and individual rights. Cybersecurity law encompasses a broad range of legal principles, regulations, and policies designed to protect digital assets, information systems, and privacy rights from cyber threats and attacks. the multifaceted nature of cybersecurity challenges, including data breaches, malware attacks, ransomware, insider threats, and state-sponsored cyber espionage, which pose significant risks to individuals, organizations, and governments worldwide.
APA, Harvard, Vancouver, ISO, and other styles
3

Rahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights." Indian Journal of Law 2, no. 3 (July 1, 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.

Full text
Abstract:
Provides an overview of the complex landscape of cybersecurity law, highlighting the challenges and legal frameworks aimed at safeguarding digital assets and privacy rights in an increasingly interconnected and digital world. the evolving nature of cybersecurity threats, the legal principles underpinning cybersecurity regulation, and the tensions between security imperatives and individual rights. Cybersecurity law encompasses a broad range of legal principles, regulations, and policies designed to protect digital assets, information systems, and privacy rights from cyber threats and attacks. the multifaceted nature of cybersecurity challenges, including data breaches, malware attacks, ransomware, insider threats, and state-sponsored cyber espionage, which pose significant risks to individuals, organizations, and governments worldwide.
APA, Harvard, Vancouver, ISO, and other styles
4

Susila, Muh, and Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, no. 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.

Full text
Abstract:
This study explores the policy and regulatory frameworks concerning cyber espionage within Indonesia and Germany. Given the considerable threats cyber espionage poses to national security and economic interests, it is crucial for nations to formulate thorough strategies to mitigate such risks. Through a comparative analysis of Indonesia and Germany—two countries with distinct geopolitical stances and methodologies regarding cybersecurity and espionage—the research delves into the legal, political, and technological factors influencing their cyber espionage policies. The methodology includes a comprehensive review of legislative measures, governmental strategies, and the response of institutions to cyber espionage in both nations. The objective is to discern the similarities, differences, and effectiveness of the policies and regulations of these countries. This comparison sheds light on the adequacy of Indonesian legislation in combating cybercrime, especially cyber espionage. The study reveals that Indonesia's legal infrastructure for cybercrime is markedly underdeveloped compared to Germany's, where stringent and well-articulated regulations are in place, facilitating precise and efficient management of cyber issues. Thus, the study underscores an urgent need for Indonesia to reform its cybercrime laws, focusing on cyber espionage, among other cyber threats, while continuing to enhance the quality of its human resources.
APA, Harvard, Vancouver, ISO, and other styles
5

Katzan, Jr., Harry. "Cybersecurity Service Model." Journal of Service Science (JSS) 5, no. 2 (December 28, 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.

Full text
Abstract:
The efficacy of modern computer systems is normally regarded as a function of five basic attributes of computer and information security: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended applications of the Internet hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy and intellectual property, secure maintenance of the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with a plethora of ad hoc safeguards and procedures, usually supplied by the competitive private sector. This paper proposes a fresh view of the cyber domain based on service science with the ultimate objective of developing a cybersecurity service model.
APA, Harvard, Vancouver, ISO, and other styles
6

Katzan, Harry. "Contemporary Issues in Cybersecurity." Journal of Cybersecurity Research (JCR) 1, no. 1 (June 21, 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.

Full text
Abstract:
The effectiveness of modern computer applications is normally regarded as a function of five basic attributes of secure computer and information systems: availability, accuracy, authenticity, confidentiality, and integrity. The concepts generally apply to government, business, education, and the ordinary lives of private individuals. The considerations normally involve extended Internet applications – hence the name Cybersecurity. Achieving and maintaining a secure cyberspace is a complicated process, and some of the concerns involve personal identity, privacy, intellectual property, the critical infrastructure, and the sustainability of organizations. The threats to a secure operating infrastructure are serious and profound: cyber terrorism, cyber war, cyber espionage, and cyber crime, to which the technical community has responded with safeguards and procedures, usually supplied by the private sector. This paper provides a comprehensive view of security in the cyber domain with the ultimate objective of developing a science of cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
7

Cristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective." Politics in Central Europe 17, no. 4 (December 1, 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.

Full text
Abstract:
Abstract This article explores the regulatory framework of reference of economic cyber-espionage in Europe, with a particular focus on the V4 region (comprising Slovakia, Hungary, Poland and the Czech Republic) and taking Hungary as a case study. Europe Union member states, including the V4 countries, are particularly exposed to economic cyber-espionage, because of the advanced know-how of the companies based therein. Under international law, there exists no uniform approach to the matter; also at the European Union level, the legal framework appears rather fragmented and the same holds true at the national level and within the V4 group, where each country has adopted its own relevant regulation. After a general overview of the relevant international and EU regulatory framework of reference, this article overviews the modus operandi of the V4 and examines its approach to economic cyber-espionage, with a special focus on Hungary as case study. As already remarked at the European and international levels, cybersecurity policies and regulations, including those regarding economic cyber-espionage operations, should be drafted in coordination among states; the V4 group can become a privileged platform of discussion to advance in the regulatory harmonisation of the issues at stake.
APA, Harvard, Vancouver, ISO, and other styles
8

Beyer, Jessica L. "The Politics of Cybersecurity and the Global Internet." Perspectives on Politics 21, no. 2 (June 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.

Full text
Abstract:
Many of the conversations about international cybersecurity have remained siloed in specific disciplines and professional cultures. As such, there is disagreement among academics and practitioners about how to define basic terms, such as “cybersecurity,” and arguments about what should “count” as part of cybersecurity. Because people’s perspectives on cybersecurity are often defined by where they “sit” professionally, practitioners and scholars are sometimes unaware that they do not share a conceptual universe. For instance, many separate international internet governance debates from conversations around global cybersecurity norms, although many of the same cleavages and barriers to agreements occur in both domains. Others consider censorship to be unrelated to cybersecurity, although espionage via hacking uses many of the same tools as the domestic surveillance that goes hand in hand with censorship. Still others do or do not incorporate considerations of internet infrastructure into conversations about conflict in spite of concerns about the security of undersea cables to most global powers. The three books under review—James Shires’s The Politics of Cybersecurity in the Middle East, Florian Egloff’s Semi-State Actors in Cybersecurity, and Kieron O’Hara and Wendy Hall’s Four Internets: Data, Geopolitics, and the Governance of Cyberspace—all help us understand how to think about this landscape. Each untangles some of these disconnects by making assumptions transparent, articulating places of overlap, unpacking terminology and categories, and offering paths forward for scholars.
APA, Harvard, Vancouver, ISO, and other styles
9

Patiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain." México y la Cuenca del Pacífico 8, no. 24 (September 1, 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

PIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 2 (July 8, 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.

Full text
Abstract:
This article addressed general issues regarding the Chinese legislative framework, competent authorities, China’s strategic objectives and the challenges in terms of international cooperation in the field of cybersecurity. The main objective of the research is to identify the actors involved in ensuring China’s cybersecurity, describe their responsibilities and correlate them with Chinese cyber-security legislation and China Cyber Security Cooperation Strategy. This study traces preliminary considerations for future in-depth analyses of the impact of China’s actions in the field of international cybersecurity. Among the main findings of the study the aspects briefly identified were related to the influences of the policies and narratives of the Chinese Communist Party presented in China’s International Cyber Security Cooperation Strategy, as well as to the fact that, despite China’s intention to become a cyber power, open to cooperation, international reactions are quite reluctant due to allegations of cyber espionage and domestic surveillance problems existing at the national level, among others.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cybersecurity Espionage"

1

Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate." Thesis, Monterey, California: Naval Postgraduate School, 2012.

Find full text
Abstract:
Approved for public release; distribution is unlimited.
Cyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity Espionage"

1

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cyber threats from China, Russia, and Iran: Protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reveron, Derek S., Jon R. Lindsay, and Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reveron, Derek S., Jon R. Lindsay, and Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. Sweden: 49books, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.

Full text
Abstract:
As societies, governments, corporations, and individuals become more dependent on the digital environment, so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyberspace more secure, stable, and predictable. Cybersecurity is concerned with the identification, avoidance, management, and mitigation of risk in, or from, cyberspace—the risk of harm and damage that might occur as the result of everything from individual carelessness to organized criminality, to industrial and national security espionage, and, at the extreme end of the scale, to disabling attacks against a country’s critical national infrastructure. But this represents a rather narrow understanding of security and there is much more to cyberspace than vulnerability, risk, and threat. As well as security from financial loss, physical damage, etc., cybersecurity must also be for the maximization of benefit. The Oxford Handbook of Cybersecurity takes a comprehensive and rounded approach to the still evolving topic of cybersecurity: the security of cyberspace is as much technological as it is commercial and strategic; as much international as regional, national, and personal; and as much a matter of hazard and vulnerability as an opportunity for social, economic, and cultural growth.
APA, Harvard, Vancouver, ISO, and other styles
9

Buchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.

Full text
Abstract:
This chapter shows how any network intrusion into a strategically-important network is threatening. Hacking is thus a key part of international relations. This is true regardless of whether or not the intrusion was launched with offensive or defensive intent. The risk of misperception is real, and the threats enabled by a network intrusion are significant. Network intrusions offer the capacity for tailored cyber attacks, for more basic wiper attacks, for general intelligence collection and espionage, and for counterintelligence work. It is very difficult to determine the intentions of an intruder, and they can change very easily—all of which leads to the possibility of danger and animates the cybersecurity dilemma.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cybersecurity Espionage"

1

Fidler, David P. "Introduction: Cybersecurity and cybersecurity law." In Cyber espionage, 2–10. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fidler, David P. "Conclusion: Cybersecurity law in a divided world." In Cyber espionage, 142–51. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Williquette, Joel F. "Cybersecurity Concerns in International Business." In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 59–71. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch004.

Full text
Abstract:
The topic is cybersecurity concerns in international business. The issue of cybersecurity and cybercrime is a complex one with several sources for cybercrime including activities by individual criminals, organized crime, and governments. The research question explored is, “Can companies protect themselves given the rise in cybercrime?” Research findings conclude that businesses need to increase their efforts and invest in technologies, staff, technical training, and processes and programs aimed at improving the use of risk-based assessments, defenses, intrusion and anomaly detection, and the business's ability to recover should a cybercrime take place.
APA, Harvard, Vancouver, ISO, and other styles
4

Mingo, Horace C. "The Emerging Cybersecurity Challenges With Artificial Intelligence." In Multisector Insights in Healthcare, Social Sciences, Society, and Technology, 163–85. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3226-9.ch010.

Full text
Abstract:
This chapter discusses the technological and socio-political challenges of integrating artificial intelligence (AI) into digital ecosystems. Understanding the power structures, ideologies, and discourses that shape cybersecurity AI perception and response is crucial. The Twitter AI-powered algorithm, the Autonomous Vehicle Accident, and the Microsoft Tay Chatbot controversy demonstrate the risks and ethical issues of AI in cybersecurity. Future possibilities include AI-enabled network intrusions, social engineering attacks, and deepfake technology for cyber espionage. The chapter discusses GDPR and CISA and emphasizes the need for AI-specific norms and internationally recognized standards to promote ethical, transparent, and responsible AI application in cybersecurity. The idea improves frameworks by integrating governance controls and creating customized risk management requirements for cybersecurity AI. Openness, accountability, and ethics are stressed to improve COBIT implementation.
APA, Harvard, Vancouver, ISO, and other styles
5

Mingo, Horace C. "How Emerging Technologies Spawn New Social Engineering Paradigms." In Transformational Interventions for Business, Technology, and Healthcare, 31–44. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1634-4.ch003.

Full text
Abstract:
Cybersecurity criminals often use social engineering techniques to meet their objectives. The most egregious cybersecurity attacks may be designed to get an organization to override defenses, change standards, or convince governing bodies to change laws and regulations through political pressure, espionage, or litigation. By creating cultures of trust or mistrust, organizational leaders can be persuaded to declassify information or make changes that allow such adversaries to gain access to things that are unavailable to them. Through time and strategy, cybercriminals can weaken cybersecurity defense capabilities and awareness. Organizations people trust may use social engineering against consumers through online advertisements, cookies, and spyware to gather data, like IP addresses, location histories, and browsing preferences, for gain and profit. This study highlights areas where social engineering tools are designed into devices and activities to influence behavior in personal and professional settings.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Jaeung, Anu Mary Eapen, Md Shamim Akbar, and H. Raghav Rao. "An Exploration Regarding Issues in Insider Threat." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 1–23. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch001.

Full text
Abstract:
Insider threat occurs when a person with legitimate access misuses his privileges and compromises the operations and security of a company. When an outsider tries to gain access to company data, it can often be managed or detected by having standard controls in place. However, when an insider who has rightful access to the data is involved, it can often go undetected. There has been a steady rise in the number of cases of insiders' threat related incidents in recent years. An insider could do this either for his own benefit or might be acting as an espionage to profit another individual or organization. Insider threat is prevalent in various forms across various disciplines and is a serious cause of concern for the operation of an organization and maintenance of trust of the customers. In this chapter, we will look at various forms of insider threats, some well-known insider threat cases, factors causing this kind of behavior, some of the key indicators and what organizations can do to deter the theft of intellectual property.
APA, Harvard, Vancouver, ISO, and other styles
7

Saharan, Sameer, Shailja Singh, Ajay Kumar Bhandari, and Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.

Full text
Abstract:
The future of cybercrimes and cyber warfare in the metaverse is a topic of concern. Understanding the emerging landscape is crucial. With technological advancements and the pervasive influence of the metaverse, new cyber threats have emerged. This chapter provides an overview of challenges and ramifications associated with cybercrimes and cyber warfare in the metaverse. It explores evolving cyber threats in the metaverse, considering AI, machine learning, and quantum computing. Cybercrimes include virtual asset theft, identity theft, phishing, harassment, and online extortion. Cyber warfare in the metaverse involves state-sponsored attacks, espionage, information warfare, and manipulation of virtual defense systems. Robust cybersecurity measures, collaboration among stakeholders, and cyber literacy are essential to mitigate risks.
APA, Harvard, Vancouver, ISO, and other styles
8

Edelman, R. David. "Defining and Studying Cyberattacks." In Rethinking Cyber Warfare, 11–52. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0003.

Full text
Abstract:
Abstract Chapter 1 opens with the claim that Estonia was a rehearsal—and in some ways the beginning of a new epoch in international security, when Kremlin-aligned actors hobbled that small Baltic nation’s economic and communications capabilities in an act of apparent political protest. It outlines the central topic and scope of the book, oriented around the question: Which, if any, forces in the international system might restrain state use of cyberattacks, despite the strategic advantage they confer? It then provides a formal definition of cyberattacks—distinct from espionage or theft, these acts of coercion or sabotage disrupting or destroying infrastructure to significant national security effect. Critically for the subsequent analysis, this definition differentiates cyberattacks (as used here) from other merely unfriendly or criminally illegal activities like spying or extortion. The chapter then explores the many of the key assumptions that motivated early analysis and in particular state doctrine on cybersecurity—on the role of nonstate actors; the ability to attribute attacks; the speed of necessary response; and even the concept of a cyberwar distinct from other state hostilities—and in each case finds them deeply flawed. With the hindsight of fifteen years, it is now possible to see just how differently the landscape for cyberattacks has evolved from prior estimations, and in turn, providing a new lens through which to interpret the historical record and assess the capacity for restraint.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity Espionage"

1

Frost, James. "Dealing with the risk of organizational espionage." In CyberSec '18: Fifth Cybersecurity Symposium. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212687.3212869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pärn, Erika. "Cybersecurity of Digital Twins in the Built Environment." In Construction Blockchain Conference 2021. Design Computation, 2021. http://dx.doi.org/10.47330/cbc.2021.wbnf3640.

Full text
Abstract:
Smart cities and digital twins promise to provide fully integrated and networked connectivity between virtual/digital assets and physical build¬ing/infrastructure assets to form digital economies. However, industrial espionage, cyber-crime and deplorable politically driven cyber-interventions threaten to disrupt and/or physically damage the critical infrastructure that supports national wealth generation and preserves the health, safety and welfare of the populous. The purpose of this presentation is to present a comprehensive review of cyber-threats confronting critical infrastructure asset management reliant upon a digital twins, common data environment (CDE) to augment building information modelling (BIM) implementation. BIM is expounded to provide newfound efficiency and productivity for the Architecture, Engineering, Construction and Operations (AECO) sector throughout the building life cycle. Presently the AECO sector is witnessing an unprecedented pace of digitalization of built assets much of which is reliant upon cloud-based systems to provide access to data-rich 3D representations of physical built assets.
APA, Harvard, Vancouver, ISO, and other styles
3

Onescu, Dragos ionut. "EU AND CYBER SECURITY." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.

Full text
Abstract:
EU and cyber security Securing network and information systems in the EU is essential to ensure prosperity and to keep the online economy running. The European Union works on a number of fronts to ensure cybersecurity in Europe, from providing the delivery of better internet for kids to implementing the international cooperation on cybersecurity and cybercrime. As societies, governments and businesses become increasingly reliant on the Internet for the normal functioning of every-day activities and the supply of essential services, protecting cyberspace from malicious activities has become a critical action point for policymakers globally. While digital and networked technologies promise much, the implications of successful attacks can be huge. The continued rapid development of information and communication technologies, globalization, the drastic increase in data volumes and the growing number of different types of equipment connected to data networks have an impact on daily life, the economy and the functioning of the state. On the one hand, this level of ICT development will contribute to the improved availability and usability of services, enhance transparency and citizen participation in governance, and cut public as well as private sector costs. On the other hand, the increasing importance of technology is accompanied by an increase in the state's growing dependence on already entrenched e-solutions, and cements the expectation of technology operating eamlessly. Social processes are also becoming increasingly dependent on a growing number of information technology resources, and in the future attention must be drawn to the fact that society at large, and each individual in particular, will be able to maintain control over the corresponding processes. Otherwise, there is potential for information technologies to reduce the role of humans in the decision-making process, and processes may become self-regulatory (technological singularity). The number of state actors in cyberspace that are involved in cyber espionage targeted at computers connected to the Internet as well as closed networks continues to grow, with their aim being to collect information on both national security as well as economic interests. The amount and activeness of states capable of cyber-attacks are increasing. In addition to the activation of state actors, the ability of politically motivated individuals and groups with limited means to organize their activities using social networks and carry out denial of service and other types of attacks is growing as well. Meaningful and effective cooperation between the public and private sector in the development of cyber security organization as well as in preventing and resolving cyber incidents is becoming increasingly unavoidable. National defense and internal security are dependent on the private sector's infrastructure and resources, while at the same time the state can assist vital service providers and guarantors of national critical information infrastructure as a coordinator and balancer of various interests.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography