Cyber Espionage: How Safe Are We?

Cyber Espionage: How Safe Are We?

Mohamed Fazil Mohamed Firdhous (University of Moratuwa, Sri Lanka)
DOI: 10.4018/978-1-4666-9905-2.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In today's world, information plays a vital role in determining the success of many endeavors. Hence, people try to gain access to information by employing many techniques that are not used under normal circumstances. Today Internet is an important resource in the lives of people and carries a vast amount of information. Hence gaining access to this information through some surreptitious means is known as cyber espionage. Cyber espionage has been a real threat to the users as it compromises the security of their precious information. Cyber espionage could be carried out by individuals, organizations or governments targeting individuals, organizations and states for obtaining information for personal, economic, political or military advantages over the other. In this chapter, the author takes an in depth look at the attacks carried out three main domains of the Internet, namely social networks, websites and email. The author not only discusses the attacks and the mechanisms used, but also proposes the precautionary methods that can be employed to protect these resources.
Chapter Preview
Top

The Internet As The Medium Of Information Storage And Transfer

The history of the Internet starts back in 1960s with the efforts of the United States government for building a robust fault-tolerant military communication network for managing its security arsenal and rapid information transfer between its military installations (Campbell-Kelly & Garcia-Swartz, 2013). This network was then known as the ARPANET, and is now considered the mother of today's Internet. Then in the early 1980s the US government allowed limited use of this network by academics with the establishment of NSFNET, which grew rapidly within the decade from 1980 to 1990, by connecting various universities and research institutes across the country. With the ceasing of government funding for the development and management of this network in the early 1990s, limited commercial use of the network was allowed. By 1995, even the NSFNET was decommissioned and replaced with the interconnection of commercial networks creating today's Internet (Villasis, 1996).

Complete Chapter List

Search this Book:
Reset