Preview

Cyber Espionage

Satisfactory Essays
Open Document
Open Document
943 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Espionage
Table of contents

1. Abstract 2. Introduction 3. What is Cyber Espionage? 4. How it Occur? 5. What can be done? 6. Cases 7. International Co-operation 8. Conclusion 9. Biblography

[pic]National Law Institute University, Bhopal[pic]

and

Rajiv Gandhi Proudyogiki Vishwavidyalay, Bhopal

Collaborative Programme Jointly Offers

Master of Science

In

Cyber Law and Information Security

PROJECT REPORT (PAPER-1)
On
“Cyber Espionage”

SUBMITTED TO- SUBMITTED BY- Atul Kumar Pandey

TABLE OF CONTENT

Abstract…………………………………………………………………………………..4

Chapter1……………………………………………………………………………….....5
Introduction
1. What is Espionage?
2. History of Espionage
1.3 What is Espionage in Cyberspace?

Chapter2 ………………………………………………………………………………9 Issues involved in Cyber Espionage
2.1Impact of Cyber Espionage
2.2Methods, target and motivation(M:Maleware ,Trojans,)
2.3Mechanism of Cyber Espionage (Copy maine jo flow diagram hai+Written in Copy )

Chapter 3………………………………………………………………………………14
Legal Aspect and Case Study
3.1 Indian Aspect
3.2 Indian Cases
3.3 International Aspect
3.3 International Cases

Chapter 4
International Cooperation ……………………...…………………………………….20(TRIPS)

Conclusion……………………………………………………………………………………….21

ABSTRACT

The aim of this report is to examine the topic of cyber espionage. Due to the increase in Internet usage incidents and threats of espionage committed through cyberspace have become frequent headlines in news stories in recent years, thus the existence of cyber espionage is undeniable. This report begins with an introduction of the topic, followed by a literature review. Moving on, the issues involved in Cyber Espionage with its legal aspect and case study following the international cooperation.

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Stuxnet

    • 933 Words
    • 4 Pages

    The discovery in June 2010 that a cyber worm dubbed ‘Stuxnet’ had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now. Yet more important is the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect. Perhaps most striking is the confluence between cyber crime and state action. States are capitalizing on technology whose development is driven by cyber crime, and perhaps outsourcing cyber attacks to non-attributable third parties, including criminal organizations. Cyber offers great potential for striking at enemies with less risk than using traditional military means. It is unclear how much the Stuxnet program cost, but it was almost certainly less than the cost of single fighter-bomber. Yet if damage from cyber attacks can be quickly repaired, careful strategic thought is required in comparing the cost and benefits of cyber versus traditional military attack. One important benefit of cyber attack may be its greater opportunity to achieve goals such as retarding the Iranian nuclear program without causing the loss of life or injury to innocent civilians that air strikes would seem more likely to inflict. Nevertheless, cyber attacks do carry a risk of collateral damage, with a risk of political blowback if the attacking parties are identified. Difficulty in identifying a cyber attacker presents multiple headaches for responding. A key strategic risk in cyber attack, finally, lies in potential escalatory responses. Strategies for using cyber weapons like Stuxnet need to take into account that adversaries may attempt to turn them back against us.…

    • 933 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber security is one of the most significant issues facing world leaders today. Besides, threats from cyber attacks pose serious challenges to global network. In fact, most governments recognize the need to implement cyber security in Information and Communications Technology (ICT) systems. Cyber security is important because it ensures security of information. ICT systems encompass various aspects of the government. For instance, ICT systems cover national security, well being and economy of the government. Essentially, cyber security ensures that reliable information is relayed to the right systems. Notably, Australian authorities are increasing awareness on cyber crimes. Additionally, governments across the world are increasing awareness on cyber attacks. Particularly, governments try to mitigate on cyber crimes by upgrading their defense systems. These actions are aimed at achieving safe and reliable ICT systems. However, governments also face obstacles in their efforts to achieve resilient ICT systems. This paper will provide a literature review on technology and the impact of cyber crime (Australian Government, 2009).…

    • 2781 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Company Law

    • 3323 Words
    • 14 Pages

    The information revolution and the advances in technology during the past decades has brought to fore many challenges and issues to both governments and businesses, the age-old crime of espionage or the practice of spying to gather secret information is one the most potential issues facing information-based societies. Although, much has been documented as fact and fiction concerning the traditional foreign agents and spies, in today 's world of multi-national, multi-billion dollar corporations, and industrial espionage is a growing danger. Furthermore, this is aggravated by the fact that many large businesses are physically disseminated which has distributed management and administration, and more job specialization.…

    • 3323 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    cyber security

    • 1147 Words
    • 5 Pages

    The critical infrastructure – such as the electricity grid, financial sector, and transportation networks that sustain our way of life – has suffered repeated cyber intrusions, and cyber-crime has increased dramatically over the last decade. The President has thus made cyber security an Administration priority. When the President released his Cyberspace Policy Review almost two years ago, he declared that the…

    • 1147 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Corporate Espionage

    • 438 Words
    • 2 Pages

    Because products tend to become obsolete much faster today than they did thirty or forty years ago, research and development are among the most important activities in modern business. However, it is an expensive activity. Some companies try to save money by paying people to conduct corporate espionage, that is, to spy on competitors' research and development operations. Is such espionage ever morally justifiable?…

    • 438 Words
    • 2 Pages
    Good Essays

Related Topics