Cyber Espionage

Topics: Security, National security, Computer security Pages: 14 (4042 words) Published: September 11, 2011
Cyber Espionage In India

Cyber espionage is an area that has recently attracted the attentions of Indian government and corporate houses alike. Both Indian government and corporate houses are the biggest loosers from cyber espionage. Sensitive information on national security and trade secrets and commercial information has been occasionally stolen through cyber espionage in India.

India has been a victim of cyber espionage on many occasions where crackers operating in foreign jurisdictions regularly attack Indian computers and have successfully taken out sensitive information. International community is stressing upon enhancement of their cyber security capabilities unlike India.

As a result of this apathy, India is facing serious cyber threats. With the growing cyber threats against India like cyber terrorism, cyber warfare, cyber espionage, etc, it is very much required to have good national cyber security policy of India.

Homeland Security of India must be strengthened and in order to do so we must take care of issues like Cyber Law, Cyber Security, Cyber Espionage, Cyber Terrorism, Cyber Warfare, etc, informs Praveen Dalal, managing partner of New Delhi based law firm Perry4Law and CEO of the exclusive techno legal cyber security research, training and educational centre of India.

Cyber espionage is not only committed for commercial benefits but it may also be motivated by patriotic feelings resulting in cyber assaults on businesses and other governmental computer systems.

Cyber Espionage may be committed by an insider or an outsider with the help of Internet and computer. The problem is that Cyber Espionage is inexpensive and relatively easy to commit and it is also difficult to prove with absolute certainty, says Dalal. Having an effective Cyber Security Mechanism at place can help in prevention of majority of Cyber Espionage issues, but there is no full proof method of preventing Cyber Espionage, claims Dalal. With adequate resources and time, a Cracker can penetrate and exploit the intended target, says Dalal.

Cyber Security in India has not received much attention of Indian government and there is not even a Cyber Security Policy of India. In fact India is vulnerable to cyber espionage, cyber crimes, cyber terrorism and many similar cyber threats. India is not serious at all regarding digital issues and others are taking advantage of this political will vacuum.


Cyber-Espionage Attacks Threaten Corporate Data in New Unrelenting Ways Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.  

Network World — Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information -- what some now call "advanced persistent threats" (APT) -- have become a top worry for businesses.  

Last week the Security for Business Innovation Council, a group of 16 security leaders from companies that include eBay, Coca-Cola Company, SAP, FedEx Corp., Johnson & Johnson and Northrop Grumman, summed up their thoughts on APT in a report, saying this type of attack is forcing IT to rethink network security. "Tackling advanced persistent threats means giving up the idea it's possible to protect everything. This is no longer realistic."  

"Focusing on fortifying the perimeter is a losing battle," bluntly states the report, which was published by RSA -- itself the well-known victim of a successful APT attack. "Today's organizations are inherently porous. Change the perspective to protecting data throughout the lifecycle across the enterprise and the entire supply chain."  

The report adds: "The definition of a successful defense has to change from 'keeping attacks out' to 'sometimes attackers are going to get in; detect them as early as possible and minimize the damage.' Assume your organization might already be compromised and go from there."  ...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cyber Espionage Essay
  • Essay about Cyber Espionage
  • Cyber Espionage Essay
  • cyber espionage Essay
  • Essay about Cyber Terrorism
  • Cyber Security in the Supply Chain Essay
  • Cyber Crime Essay
  • cyber security Essay

Become a StudyMode Member

Sign Up - It's Free