Cyber-collection (original) (raw)

About DBpedia

Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of malware into a targeted network or computer in order to scan for, collect and exfiltrate sensitive information. Cyber-collection started as far back as 1996, when widespread deployment of Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities.

Property Value
dbo:abstract Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of malware into a targeted network or computer in order to scan for, collect and exfiltrate sensitive information. Cyber-collection started as far back as 1996, when widespread deployment of Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities. In addition to the state sponsored examples, cyber-collection has also been used by organized crime for identity and e-banking theft and by corporate spies. Operation High Roller used cyber-collection agents in order to collect PC and smart-phone information that was used to electronically raid bank accounts. The , aka Red October, collection system is an "espionage for hire" operation by organized criminals who sell the collected information to the highest bidder. (en) Cibercoleta refere-se ao uso de técnicas de guerra cibernética para a condução de espionagem. As atividades de coleta seletiva normalmente dependem da inserção de malware em uma rede ou computador alvo para verificar, coletar e exfiltrar informações confidenciais. Cibercoleta começou por volta de 1996, quando a implantação generalizada de conectividade com a Internet para o governo e sistemas corporativos ganhou impulso. Desde esse tempo, tem havido numerosos casos de tal atividade. Além dos exemplos patrocinados pelo Estado, a coleta eletrônica também tem sido usada pelo crime organizado para identificação e roubo de bancos online, e por espiões corporativos. A operação High Roller usou agentes de coleta eletrônica para coletar informações de PC e smart-phone que foram usadas para atacar contas bancárias de forma eletrônica. O Rocra, também conhecido como "Red October", sistema de cobrança é uma operação de "espionagem por aluguel" por criminosos organizados que vendem as informações coletadas ao maior licitante. (pt) Киберсбор — это использование методов кибервойны для ведения шпионажа, Частный случай кибершипонажа . Действия по киберсбору обычно основаны на внедрении вредоносного ПО в целевую сеть или компьютер для сканирования, сбора и вывода конфиденциальной и(или) секретной информации. Киберсбор начался ещё в 1996 году, когда широкое распространение доступа к интернету к правительственным и корпоративным системам набрало обороты. С тех пор было зафиксировано множество случаев такой деятельности. В дополнение к примерам, включающим в себя государство, киберсбор также использовался организованной преступностью для кражи личных данных и электронных банковских операций, а также корпоративными шпионами. В рамках Операции High Roller использовались программы для сбора информации о ПК и смартфонах, использовавшихся для электронных рейдов на банковские счета. Система сбора Rocra, также известная как «Красный Октябрь», представляет собой «шпионаж по найму» от организованных преступников, которые продают собранную информацию тому, кто больше заплатит. (ru)
dbo:wikiPageID 38289699 (xsd:integer)
dbo:wikiPageLength 16871 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID 1060664335 (xsd:integer)
dbo:wikiPageWikiLink dbr:Black_bag_operation dbr:Cyber-security_regulation dbr:Cyberwarfare dbr:Duqu dbc:Computing_terminology dbr:Computer_insecurity dbr:Espionage dbr:Endgame,_Inc. dbr:Global_surveillance_disclosures_(2013–present) dbr:Proactive_Cyber_Defence dbc:Hacking_(computer_security) dbc:Cybercrime dbc:Cyberwarfare dbr:Stuxnet dbr:Commercial_off-the-shelf dbr:Chinese_intelligence_operations_in_the_United_States dbr:Phishing dbr:Computer_surveillance dbr:Surveillance dbc:Spyware dbr:Drive-by_download dbr:Hacking_Team dbc:Security_engineering dbc:Social_engineering_(computer_security) dbr:Air_gap_(networking) dbr:FBI dbr:Internet_connectivity dbr:HUMINT dbr:Covert_listening_device dbc:Computer_security_procedures dbc:Espionage dbc:Military_intelligence_collection dbc:National_security dbr:Chaos_Computer_Club dbc:Sabotage dbr:Tailored_Access_Operations dbr:Trojan_horse_(computing) dbc:Information_sensitivity dbc:Mass_intelligence-gathering_systems dbr:Industrial_espionage dbr:Microsoft dbr:Carnivore_(software) dbr:Operation_High_Roller dbr:USB_flash_drive dbr:Windows_Update dbr:Lawful_Interception dbr:Flame_(malware) dbr:GhostNet dbr:Malware dbr:Packet_analyzer dbr:Keylogger dbr:0-day_attack dbr:Cyber-warfare dbr:Cyber_stalking dbr:Zero-day_attack dbr:Injection_Proxy dbr:Rocra
dbp:wikiPageUsesTemplate dbt:Reflist dbt:Espionage dbt:Intelligence_cycle_management
dcterms:subject dbc:Computing_terminology dbc:Hacking_(computer_security) dbc:Cybercrime dbc:Cyberwarfare dbc:Spyware dbc:Security_engineering dbc:Social_engineering_(computer_security) dbc:Computer_security_procedures dbc:Espionage dbc:Military_intelligence_collection dbc:National_security dbc:Sabotage dbc:Information_sensitivity dbc:Mass_intelligence-gathering_systems
rdf:type yago:WikicatComputerSecurityProcedures yago:Abstraction100002137 yago:Act100030358 yago:Activity100407535 yago:Event100029378 yago:Group100031264 yago:Procedure101023820 yago:PsychologicalFeature100023100 yago:WikicatHackerGroups yago:YagoPermanentlyLocatedEntity
rdfs:comment Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of malware into a targeted network or computer in order to scan for, collect and exfiltrate sensitive information. Cyber-collection started as far back as 1996, when widespread deployment of Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities. (en) Cibercoleta refere-se ao uso de técnicas de guerra cibernética para a condução de espionagem. As atividades de coleta seletiva normalmente dependem da inserção de malware em uma rede ou computador alvo para verificar, coletar e exfiltrar informações confidenciais. Cibercoleta começou por volta de 1996, quando a implantação generalizada de conectividade com a Internet para o governo e sistemas corporativos ganhou impulso. Desde esse tempo, tem havido numerosos casos de tal atividade. (pt) Киберсбор — это использование методов кибервойны для ведения шпионажа, Частный случай кибершипонажа . Действия по киберсбору обычно основаны на внедрении вредоносного ПО в целевую сеть или компьютер для сканирования, сбора и вывода конфиденциальной и(или) секретной информации. Киберсбор начался ещё в 1996 году, когда широкое распространение доступа к интернету к правительственным и корпоративным системам набрало обороты. С тех пор было зафиксировано множество случаев такой деятельности. (ru)
rdfs:label Cyber-collection (en) Cibercoleta (pt) Киберсбор (ru)
owl:sameAs freebase:Cyber-collection yago-res:Cyber-collection wikidata:Cyber-collection dbpedia-pt:Cyber-collection dbpedia-ru:Cyber-collection https://global.dbpedia.org/id/4ihH9
prov:wasDerivedFrom wikipedia-en:Cyber-collection?oldid=1060664335&ns=0
foaf:isPrimaryTopicOf wikipedia-en:Cyber-collection
is dbo:wikiPageWikiLink of dbr:Cyber_spying dbr:Cyberwarfare dbr:Intelligence_officer dbr:Master_of_Science_in_Cyber_Security dbr:Guardian_Analytics dbr:Operation_High_Roller
is foaf:primaryTopic of wikipedia-en:Cyber-collection