Home > Industry/Domain > Internet; Law enforcement > Cyber espionage

Cyber espionage

The act of illegally obtaining another party's secrets and classified information without permission over the Internet for the purpose of economic, political or military advantage. Cyber espionage uses a variety of methods such as cracking techniques and malicious software to hijack computers or networks on the Internet in order to steal information.

Contributors in Cyber espionage

Cyber espionage

mitigation

Law enforcement; Cyber espionage

Solutions that contain or resolve risks through analysis of threat activity and vulnerability data which provide timely and accurate responses to prevent attacks, reduce vulnerabilities and fix ...

national military strategy for cyberspace operations (NMS-CO)

Law enforcement; Cyber espionage

The comprehensive strategy of the US Armed Forces to ensure US military superiority in cyberspace. The NMS-CO establishes a common understanding of cyberspace and sets forth a military strategic ...

network operations (NetOps)

Law enforcement; Cyber espionage

Activities conducted to operate and defend the DOD's Global information Grid.

offensive counter-cyber (OCC)

Law enforcement; Cyber espionage

Offensive operations to destroy, disrupt, or neutralize adversary cyberspace capabilities both before and after their use against friendly forces, but as close to their souce as possible. The goal of ...

computer network attack (CNA)

Law enforcement; Cyber espionage

A category of "fires" employed for offensive purposes in which actions are taken through the use of computer networks to disrupt, deny, degrade, manipulate, or destroy information resident in the ...

cyberspace operations (CO)

Law enforcement; Cyber espionage

The employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace. Such operations include computer network operations and activities to operate and ...

offensive cyberspace operations (OCO)

Law enforcement; Cyber espionage

Activities that, through the use of cyberspace, actively gather information from computers, information systems, or networks, or manipulate, disrupt, deny, degrade, or destroy targeted computers, ...

Featured blossaries

Eucharistic Objects

Category: Religion   1 14 Terms

English Grammar Terms

Category: Languages   1 17 Terms