翻訳と辞書
Words near each other
・ "O" Is for Outlaw
・ "O"-Jung.Ban.Hap.
・ "Ode-to-Napoleon" hexachord
・ "Oh Yeah!" Live
・ "Our Contemporary" regional art exhibition (Leningrad, 1975)
・ "P" Is for Peril
・ "Pimpernel" Smith
・ "Polish death camp" controversy
・ "Pro knigi" ("About books")
・ "Prosopa" Greek Television Awards
・ "Pussy Cats" Starring the Walkmen
・ "Q" Is for Quarry
・ "R" Is for Ricochet
・ "R" The King (2016 film)
・ "Rags" Ragland
・ ! (album)
・ ! (disambiguation)
・ !!
・ !!!
・ !!! (album)
・ !!Destroy-Oh-Boy!!
・ !Action Pact!
・ !Arriba! La Pachanga
・ !Hero
・ !Hero (album)
・ !Kung language
・ !Oka Tokat
・ !PAUS3
・ !T.O.O.H.!
・ !Women Art Revolution


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

cyber spying : ウィキペディア英語版
cyber spying
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware.〔(【引用サイトリンク】url=http://www.pcmag.com/encyclopedia/term/64376/cyber-espionage )〕〔(【引用サイトリンク】url=http://www.techopedia.com/definition/27101/cyberspying )〕 It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.〔
Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategic advantage and for psychological, political and physical subversion activities and sabotage. More recently, cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter.〔(Five ways the government spies on you )〕
Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by the highest level of government in the aggressor country. The ethical situation likewise depends on one's viewpoint, particularly one's opinion of the governments involved.〔
In response to reports of cyber spying by China against the United States, Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that China and the United States should agree to a policy of mutually assured restraint with respect to cyberspace. This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps or engaging in cyber espionage; it would also entail vetting these commitments.〔Etzioni, Amitai, "MAR: A Model for US-China Relations," The Diplomat, September 20, 2013, ().〕 In September 2015, the United States and China agreed not to allow parties in their nations to cyberspy on each other for commercial gain, but did not prohibit government spying.
== See also ==

* Cyber-collection
* Cyberwarfare
* Computer surveillance
* Computer insecurity
* Chinese intelligence operations in the United States
* Cyber-security regulation
* Employee monitoring software
* Industrial espionage
* GhostNet
* Proactive Cyber Defence
* Surveillance
* Chaos Computer Club
* Titan Rain
* the Dukes, a well-resourced, highly dedicated and organized cyberespionage group that F-Secure believe has been working for the Russian Federation since at least 2008.〔(the Dukes, timeline )〕〔(The Dukes Whitepaper )〕〔(17 September 2015, F-Secure Labs links nearly a decade of state-sponsored cyberattacks to a group of hackers backed by Russia. )〕

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「cyber spying」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.