Home > Industry/Domain > Internet; Law enforcement > Cyber espionage
Cyber espionage
The act of illegally obtaining another party's secrets and classified information without permission over the Internet for the purpose of economic, political or military advantage. Cyber espionage uses a variety of methods such as cracking techniques and malicious software to hijack computers or networks on the Internet in order to steal information.
Industry: Internet; Law enforcement
Add a new termContributors in Cyber espionage
Cyber espionage
mitigation
Law enforcement; Cyber espionage
Solutions that contain or resolve risks through analysis of threat activity and vulnerability data which provide timely and accurate responses to prevent attacks, reduce vulnerabilities and fix ...
national military strategy for cyberspace operations (NMS-CO)
Law enforcement; Cyber espionage
The comprehensive strategy of the US Armed Forces to ensure US military superiority in cyberspace. The NMS-CO establishes a common understanding of cyberspace and sets forth a military strategic ...
network operations (NetOps)
Law enforcement; Cyber espionage
Activities conducted to operate and defend the DOD's Global information Grid.
offensive counter-cyber (OCC)
Law enforcement; Cyber espionage
Offensive operations to destroy, disrupt, or neutralize adversary cyberspace capabilities both before and after their use against friendly forces, but as close to their souce as possible. The goal of ...
computer network attack (CNA)
Law enforcement; Cyber espionage
A category of "fires" employed for offensive purposes in which actions are taken through the use of computer networks to disrupt, deny, degrade, manipulate, or destroy information resident in the ...
cyberspace operations (CO)
Law enforcement; Cyber espionage
The employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace. Such operations include computer network operations and activities to operate and ...
offensive cyberspace operations (OCO)
Law enforcement; Cyber espionage
Activities that, through the use of cyberspace, actively gather information from computers, information systems, or networks, or manipulate, disrupt, deny, degrade, or destroy targeted computers, ...