Fandom

The IT Law Wiki

Cyberexploitation

32,196pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definitions Edit

Cyberexploitation (CyE) is

the use of cyber-offensive actions — possibly over an extended period of time — to support the goals and missions of the party conducting the exploitation, usually for the purpose of obtaining information resident on or transiting through an adversary's computer systems or networks.
actions combine computer network exploitation (CNE) with enabling capabilities (such as, electronic warfare support (ES), signal intelligence (SIGINT), and others) for intelligence collection and other efforts.[1]

Overview Edit

Cyberexploitation is an intelligence-gathering activity rather than a destructive activity. Cyberexploitations do not seek to disturb the normal functioning of a computer system or network from the user’s point of view — indeed, the best cyberexploitation is one that such a user never notices.

Although much of the technology underlying cyberexploitation is similar to that of cyberattack, cyberattack and cyberexploitation are conducted for entirely different purposes.

References Edit

  1. The U.S. Army Concept Capability Plan for Cyberspace Operations 2016-2028, at 21.

Source Edit

Also on Fandom

Random Wiki