Byzantine Foothold
Byzantine Foothold is the unclassified code name related to a United States Department of Defense effort within the larger Cyber Initiative framework, specifically aimed at curbing and preventing foreign intrusions into the computer networks of US federal agencies. It has been said that this threat is related to ongoing efforts by Chinese hackers of the Peoples Liberation Army, but no public documentation is available which would prove that was the case.Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. , The twenty largest American military-industrial contractors have also been invited to participate in the program, after a highly potent hacker attack was detected at the Booz Allen Hamilton Corporation. Although the US Government sees this as the largest cyber espionage effort against them, no arrests have been made and no specific cyber intruder has been identified. No public informatio ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United States Department Of Defense
The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national security and the United States Armed Forces. The DoD is the largest employer in the world, with over 1.34 million active-duty service members (soldiers, marines, sailors, airmen, and guardians) as of June 2022. The DoD also maintains over 778,000 National Guard and reservists, and over 747,000 civilians bringing the total to over 2.87 million employees. Headquartered at the Pentagon in Arlington, Virginia, just outside Washington, D.C., the DoD's stated mission is to provide "the military forces needed to deter war and ensure our nation's security". The Department of Defense is headed by the secretary of defense, a cabinet-level head who reports directly to the president of the United States. Beneath the Department of Defense are t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Peoples Liberation Army
The People's Liberation Army (PLA) is the principal military force of the People's Republic of China and the armed wing of the Chinese Communist Party (CCP). The PLA consists of five service branches: the Ground Force, Navy, Air Force, Rocket Force, and Strategic Support Force. It is under the leadership of the Central Military Commission (CMC) with its chairman as commander-in-chief. The PLA can trace its origins during the Republican Era to the left-wing units of the National Revolutionary Army (NRA) of the Kuomintang (KMT) when they broke away on 1 August 1927 in an uprising against the nationalist government as the Chinese Red Army before being reintegrated into the NRA as units of New Fourth Army and Eighth Route Army during the Second Sino-Japanese War. The two NRA communist units were reconstituted into the PLA on 10 October 1947. Today, the majority of military units around the country are assigned to one of five theater commands by geographical location. T ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Booz Allen Hamilton
Booz Allen Hamilton Holding Corporation (informally Booz Allen) is the parent of Booz Allen Hamilton Inc., an American management and information technology consulting firm, headquartered in McLean, Virginia, in Greater Washington, D.C., with 80 other offices around the globe. The company's stated core business is to provide consulting, analysis and engineering services to public and private sector organizations and nonprofits. History Beginnings The company that was to become Booz Allen was founded in 1914, in Evanston, Illinois, when Northwestern University graduate Edwin G. Booz founded the ''Business Research Service.'' The service was based on Booz's theory that companies would be more successful if they could call on someone outside their own organizations for expert, impartial advice.Booz Allen History Boozallen.com. Retrieve ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Moonlight Maze
Moonlight Maze was a 1999 US government investigation into a massive data breach of classified information. It started in 1996 and affected NASA, the Pentagon, military contractors, civilian academics, the DOE, and numerous other American government agencies. By the end of 1999, the Moonlight Maze task force was composed of forty specialists from law enforcement, military, and government. The investigators claimed that if all the information stolen was printed out and stacked, it would be three times the height of the Washington Monument, which is tall. The Russian government was blamed for the attacks, although there was initially little hard evidence to back up the US accusations besides a Russian IP address that was traced to the hack. Moonlight Maze represents one of the first widely known cyber espionage campaigns in world history. It was even classified as an Advanced Persistent Threat (a very serious designation for stealthy computer network threat actors, typically a n ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Titan Rain
Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years. The attacks originated in Guangdong, China. The activity is believed to be associated with a state-sponsored advanced persistent threat. It was given the designation ''Titan Rain'' by the federal government of the United States. Titan Rain hackers gained access to many United States defense contractor computer networks, which were targeted for their sensitive information, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA. Attackers The attacks are reported to be the result of actions by People's Liberation Army Unit 61398. These hackers attacked both the US government (Defense Intelligence Agency) and the UK government (Ministry of Defence). In 2006, an "organised Chinese hacking group" shut down a part of the UK House of Commons computer system. The Chinese government has ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Stakkato
Stakkato is the alias of Swede Philip Gabriel Pettersson, the alleged perpetrator of a worldwide cyber attack known to have occurred from at least December 2003 until May 2005, targeting many sites on the Internet including the US Military, White Sands Missile Range, NASA, a number of US academic institutions (known to include Caltech, Stanford University, San Diego Supercomputer Center, and UIUC), and a number of non-US academic institutions (known to include Uppsala University in Sweden and University College Cork in Ireland) and several other Internet locations. By using locally based kernel exploits (a sophisticated technique that requires a high knowledge level and advanced development skills), Stakkato managed to elevate its user privileges and gain control of various systems within numerous government agencies and private sector enterprises. Via stolen login credentials Stakkato was able to gain access to these systems for well over two years. Finally, Stakkato was able ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Stuxnet
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Computer Network Security
A network security policy (NSP) is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security/ network security environment. The document itself is usually several pages long and written by a committee. A security policy is a complex document, meant to govern data access, web- browsing habits, use of passwords, encryption, email attachments and more. It specifies these rules for individuals or groups of individuals throughout the company. The policies could be expressed as a set of instructions that understood by special purpose network hardware dedicated for securing the network. Security policy should keep the malicious users out and also exert control over potential risky users within an organization. Understanding what information and services are available and to which users, as well as what the potential is for damage and whether any protection is already in ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |