cyber espionage

(redirected from cyber weapon)

cyber espionage

Unauthorized spying by computer. The term generally refers to the deployment of viruses that clandestinely observe or destroy data in the computer systems of government agencies and large enterprises. See Stuxnet and Flame virus.
References in periodicals archive ?
Making cyber weapon use easily discoverable and allowing actors to trace the use back to the United States will open a line of communication, albeit rather indirect.
The key to developing a viable build-and-discard cyber weapon capability includes significant reforms or new authorities in the federal acquisition regulations.
Bossert said at a White House news conference that Pyongyang was responsible for the WannaCry cyber weapon launched in May.
For example, a cyber weapon may be needed to disrupt the enemy's integrated air defense systems to allow the F-22s to stay on station long enough to provide sensor information.
Strategic cyber weapon technology that has been leaked is currently in the hands of criminal organizations that are using it against civilian commercial targets with no defenses against it.
A nonexhaustive list of potential cyber weapon uses includes warfighting, coercion, deterrence, and defense diplomacy.
With a cyber weapon, you can use it only once and then it is very hard to control it.
USPRwire, Mon Oct 12 2015] According to a new market report published by Transparency Market Research "Cyber Weapon Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2015 - 2021," global cyber weapon market was valued at USD 390.
Perhaps the best-known indiscriminate cyber weapon is a malicious but seemingly innocuous email attachment sent to a combatants private e-mail account.
A new kind of weapon long speculated about but never seen, a specially designed cyber weapon, had finally been used.
11) Another sophisticated cyber weapon called Flame was designed to spread to other systems over a local network or via USB drive, with the ability to record audio, capture screenshots, log keyboard activity, and network traffic.
To conduct such an extremely precise and stealthy operation requires a preceding intelligence operation to guarantee the success; especially when any cyber weapon is a double-edged sword that may be used against the attacker in retaliation.