Cyberespionage Prevention Essay

854 Words2 Pages

Cyberespionage: What it is and how to Prevent it Cyberespionage in today’s world has become more than a farfetched conspiracy theory. The reality is that there are legitimate threats to individuals, corporations, and governments occurring daily with the purpose of gaining access to confidential information. It is imperative that everyone from end users to network administrators are aware of the threat that cyberespionage poses, and are familiar with methods to detect and prevent these types of attacks. Failure to do so can leave sensitive data vulnerable and victims dealing with the potentially damaging effects. Describing Cyberespionage Cyberespionage can be defined as the attempt to gain access to confidential information using computer networks. Having lax policies regarding the usage of these devices makes it all too easy for someone to copy data and walk out of the building with it. If absolutely needed, the use of such devices should be logged by recording the user who accessed the data and the data that was stored (Easttom, pg. 144, 2012). Many of these policies can be implemented through the use of group policies if administering a Windows based network which can simplify the deployment of these As demonstrated by the examples above, these attacks can be extremely difficult to detect and mitigate. This highlights the need to ensure that all employees in an organization are aware of the threat these attacks present and are familiar with ways to stop them. Implementing the techniques mentioned above along with other proven methods will ensure that organizations are equipped to defend themselves against cyberespionage attacks. References Aitoro, J. (2015, March 11). We're learning more about cyberespionage attackers Equation Group. And it's pretty terrifying. Retrieved from http://www.bizjournals.com/washington/blog/fedbiz_daily/2015/03/were-learning-more-about-cyberesionage-attackers.html Easttom, C. (2012). Computer Security Fundamentals, Second Edition (2nd ed.). Pearson Certification. Constantin, L. (2013). Researchers find TeamViewer-based cyberespionage operation.

More about Cyberespionage Prevention Essay

Open Document