Advanced Persistent Threat
An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political or economic. Every major business sector has recorded instances of cyberattacks by advanced actors with specific goals, whether to steal, spy, or disrupt. These targeted sectors include government, defense, financial services, legal services, industrial, telecoms, consumer goods and many more. Some groups utilize traditional espionage vectors, including social engineering, human intelligence and infiltration to gain access to a physical location to enable network attacks. The purpose of these attacks is to install custom malware (malicious software). The median "dwell-time", the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Threat Actor
A threat actor or malicious actor is either a person or a group of people that take part in an action that is intended to cause harm to the cyber realm including: computers, devices, systems, or networks. The term is typically used to describe individuals or groups that perform malicious acts against a person or an organization of any type or size. Threat actors engage in cyber related offenses to exploit open vulnerabilities and disrupt operations. Threat actors have different educational backgrounds, skills, and resources. The frequency and classification of cyber attacks changes rapidly. The background of threat actors helps dictate who they target, how they attack, and what information they seek. There are a number of threat actors including: cyber criminals, nation-state actors, ideologues, thrill seekers/trolls, insiders, and competitors. These threat actors all have distinct motivations, techniques, targets, and uses of stolen data. Background The development of cyberspac ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Asia-Pacific
Asia-Pacific (APAC) is the part of the world near the western Pacific Ocean. The Asia-Pacific region varies in area depending on context, but it generally includes East Asia, Russian Far East, South Asia, Southeast Asia, Australia and Pacific Islands. Definition The term may include countries in North America and South America that are on the coast of the Eastern Pacific Ocean; the Asia-Pacific Economic Cooperation, for example, includes Canada, Chile, Mexico, Peru, and the United States. Alternatively, the term sometimes comprises all of Asia and Australasia as well as Pacific island nations (Asia-Pacific and Australian continent)—for example, when dividing the world into large regions for commercial purposes (e.g., into APAC, EMEA, LATAM, and NA). Central Asia and Western Asia are almost never included. [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Sovereign State
A sovereign state or sovereign country, is a polity, political entity represented by one central government that has supreme legitimate authority over territory. International law defines sovereign states as having a permanent population, defined territory (see territorial disputes), one government, and the capacity to enter into International relations, relations with other sovereign states. It is also normally understood that a Sovereignty#Sovereignty and independence, sovereign state is independent. According to the declarative theory of statehood, a sovereign state can exist without being Diplomatic recognition, recognised by other sovereign states.Thomas D. Grant, ''The recognition of states: law and practice in debate and evolution'' (Westport, Connecticut: Praeger, 1999), chapter 1. List of states with limited recognition, Unrecognised states will often find it difficult to exercise full treaty-making powers or engage in Diplomacy, diplomatic relations with other sovereign ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cyber-Attacks
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organisations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyber attacks have increased with an alarming rate for the last few years A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seeking to limit the use of the ter ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United States Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise. USCYBERCOM was created in mid-2009 at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception. While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command. Mission statement According to the US Department of Defense (DoD): The text "9ec4c12949a4f31474f299058ce2b22a", located in the command's emblem, is the MD5 hash of their mission statement. The comm ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cyberspace
Cyberspace is a concept describing a widespread interconnected digital technology. "The expression dates back from the first decade of the diffusion of the internet. It refers to the online world as a world 'apart', as distinct from everyday reality. In cyberspace people can hide behind fake identities, as in the famous The New Yorker cartoon." (Delfanti, Arvidsson, 150) The term entered popular culture from science fiction and the arts but is now used by technology strategists, security professionals, government, military and industry leaders and entrepreneurs to describe the domain of the global technology environment, commonly defined as standing for the global network of interdependent information technology infrastructures, telecommunications networks and computer processing systems. Others consider cyberspace to be just a notional environment in which communication over computer networks occurs. The word became popular in the 1990s when the use of the Internet, networking, a ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
CIO Magazine
''CIO'' is a magazine related to technology and IT. The magazine was founded in 1987 and is now entirely digital. The name refers to the job title chief information officer. ''CIO'' is part of Boston-based International Data Group's enterprise publications business. Background Founded 1987 in Framingham, Massachusetts Framingham () is a city in the Commonwealth of Massachusetts in the United States. Incorporated in 1700, it is located in Middlesex County and the MetroWest subregion of the Greater Boston metropolitan area. The city proper covers with a popu ..., as a monthly magazine at a time when the CIO title was relatively new and relatively unknown in corporate America, today ''CIO'' is also noted for its ''CIO''-100 annual awards, for those "that have distinguished themselves through the effective and innovative use" of information technology. CIO.com In 1996, the website was launched as a companion to the magazine. On October 29, 2015, editor-in-chief Maryfran Jo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
PC World
''PC World'' (stylized as PCWorld) is a global computer magazine published monthly by IDG. Since 2013, it has been an online only publication. It offers advice on various aspects of PCs and related items, the Internet, and other personal technology products and services. In each publication, ''PC World'' reviews and tests hardware and software products from a variety of manufacturers, as well as other technology related devices such as still and video cameras, audio devices and televisions. The current editor of ''PC World'' is Jon Phillips, formerly of ''Wired''. In August 2012, he replaced Steve Fox, who had been editorial director since the December 2008 issue of the magazine. Fox replaced the magazine's veteran editor Harry McCracken, who resigned that spring, after some rocky times, including quitting and being rehired over editorial control issues in 2007. ''PC World'' is published under other names such as PC Advisor and PC Welt in some countries. ''PC World''s company ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Computer Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Iran's Nuclear Program
The nuclear program of Iran is an ongoing scientific effort by Iran to research nuclear technology that can be used to make nuclear weapons. Iran has several research sites, two uranium mines, a research reactor, and uranium processing facilities that include three known uranium enrichment plants. Iran's nuclear program was launched in the 1950s with the help of the United States under the Atoms for Peace program, and in 1970, Iran ratified the Non-Proliferation Treaty (NPT), limiting its nuclear program to peaceful use, and making its nuclear program subject to inspection by the International Atomic Energy Agency (IAEA). Western cooperation ceased following the 1979 Iranian Revolution, after which Iran continued its nuclear program on a clandestine basis. In the 2000s, the revelation of Iran's clandestine uranium enrichment program raised concerns that the program might be intended for non-peaceful uses. The IAEA launched an investigation in 2003 after an Iranian dissident ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Computer Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as th ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows o ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |