Cyber Espionage

Only available on StudyMode
  • Topic: Espionage, Cyberspace, Secrecy
  • Pages : 5 (943 words )
  • Download(s) : 138
  • Published : January 24, 2013
Open Document
Text Preview
Table of contents

1. Abstract
2. Introduction
3. What is Cyber Espionage?
4. How it Occur?
5. What can be done?
6. Cases
7. International Co-operation
8. Conclusion
9. Biblography

[pic]National Law Institute University, Bhopal[pic]

and

Rajiv Gandhi Proudyogiki Vishwavidyalay, Bhopal

Collaborative Programme Jointly Offers

Master of Science

In

Cyber Law and Information Security

PROJECT REPORT (PAPER-1)
On
“Cyber Espionage”

SUBMITTED TO- SUBMITTED BY- Atul Kumar Pandey

TABLE OF CONTENT

Abstract…………………………………………………………………………………..4

Chapter1……………………………………………………………………………….....5 Introduction
1. What is Espionage?
2. History of Espionage
1.3 What is Espionage in Cyberspace?

Chapter2 ………………………………………………………………………………9 Issues involved in Cyber Espionage
2.1Impact of Cyber Espionage
2.2Methods, target and motivation(M:Maleware ,Trojans,)
2.3Mechanism of Cyber Espionage (Copy maine jo flow diagram hai+Written in Copy )

Chapter 3………………………………………………………………………………14 Legal Aspect and Case Study
3.1 Indian Aspect
3.2 Indian Cases
3.3 International Aspect
3.3 International Cases

Chapter 4
International Cooperation ……………………...…………………………………….20(TRIPS)

Conclusion……………………………………………………………………………………….21

ABSTRACT

The aim of this report is to examine the topic of cyber espionage. Due to the increase in Internet usage incidents and threats of espionage committed through cyberspace have become frequent headlines in news stories in recent years, thus the existence of cyber espionage is undeniable. This report begins with an introduction of the topic, followed by a literature review. Moving on, the issues involved in Cyber Espionage with its legal aspect and case study following the international cooperation.

Chapter 1

INTRODUCTION

It would not be wrong if we say that we are living in a world of five dimensions world where the fifth dimension is the Cyberspace where everything is available on just a single click. It is good in sense of technological presperstive but as we know every story has two sides likewise Internet has supported many activities in which a person can access an confidential data by sitting far from the whole scene.

Cyber espionage is the use of software tools to obtain secret or private information about another government or business competitor. Instances of cyber espionage are becoming quite common, with regular reports of thousands of megabytes of data and intellectual property worth millions being exfiltrated from the websites and Networks of both government and private enterprises. According to a study by research firm SANS Institute[1], cyber espionage is ranked Number 3 on its Top Five Menaces for 2008. Hence cyber espionage is an increasing concern in today’s society. Over the past decade, globalization has led to an increase in competition and hence the tendency to steal information to gain a competitive edge increases. Another explanation for a rise in espionage levels is the growth of computer technologies. Computers have shortened the time spent to steal data as individuals can download information and save it in a few seconds, as opposed to spending hours secretly duplicating documents. Computers are interconnected via the company’s network, which is linked to an internet, thus increasing the points of entry through which hackers can gain access to information.

1. What is Espionage?

“The practice of spying or of using spies, typically by governments to obtain political and military information”[2].

2. History Of Espionage [3]

Espionage and intelligence have been around since human beings first began organizing themselves into distinct societies, cities, states, nations, and...
tracking img