Yhtomit: differentiate between acts of cyber-espionage from simple

Differentiate between acts of cyber-espionage from simple criminal acts or an act of hacktivism? Provide detailed examples.

Kenney, M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis59(1), 111-128. (18 pages), (Accessible via the weekly reading folder within the resources section).

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

 

Kramer, Franklin D., et.al. (Eds) From Cyberspace to Cyberpower: Cyber Power and National Security, Chapter 18, “Cyber Crime” 415-436 (32 pages); Chapter 19, “Cyber Terrorism: Menace or Myth” 437-464 (28 pages)

 

Mandiant, APT1: Exposing One of China’s Cyber Espionage Units, (2013) (Accessible via the weekly reading folder within the resources section).