An Analysis of Cyber Espionage Process


Abstract:

The recent increasing cases released worldwide on espionage require a knowledge systematization study in this area. This paper presents a general scheme of cyber espionage process based on a literature review of remarkable cases which generated news about this topic and includes the malware report analysis made by security vendors. To understand the aspects involved and the approaches employed, we defined a general model to cover all phases used by cyber espionage. Our model considers two main aspects: first, the technical aspect driven by the rapid advance of information and communication technologies (ICT), as well as the software engineering level used by cybercriminals to create sophisticated malware; second, the human aspect influenced by the power struggle between nations and politicians, also considering the lack of technological knowledge or training in organizations. As a result, it allows the attackers using social engineering as the most effective mean for systems intruding.

Año de publicación:

2022

Keywords:

  • Computer security
  • Malware
  • Cyber espionage

Fuente:

scopusscopus
googlegoogle

Tipo de documento:

Conference Object

Estado:

Acceso restringido

Áreas de conocimiento:

    Áreas temáticas de Dewey:

    • Programación informática, programas, datos, seguridad
    • Criminología
    • Relaciones internacionales
    Procesado con IAProcesado con IA

    Objetivos de Desarrollo Sostenible:

    • ODS 16: Paz, justicia e instituciones sólidas
    • ODS 4: Educación de calidad
    • ODS 9: Industria, innovación e infraestructura
    Procesado con IAProcesado con IA