Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Cyberweapon

Index Cyberweapon

A cyberweapon is a malware agent employed for military, paramilitary, or intelligence objectives. [1]

48 relations: Amnesty International, Ashlee Vance, Botnet, Classified information, Computer virus, Cyber-arms industry, Cyberterrorism, Cyberwarfare, Data breach, Duqu, Electromechanics, Espionage, Exploit (computer security), Flame (malware), Fourth-generation warfare, Fraud, Great Cannon, Intellectual property, Julian Assange, Malware, Military, Military intelligence, Mirai (malware), Non-state actor, Open-source software, Organized crime, Paramilitary, Password, Patch (computing), Privacy, Proactive cyber defence, Process control, Public-key cryptography, Rootkit, Script kiddie, Security hacker, Self-replication, Soldier, Sovereign state, Sovereignty, Stuxnet, Trade secret, Use of force, Vault 7, Vector (malware), WikiLeaks, Wiper (malware), Zero-day (computing).

Amnesty International

Amnesty International (commonly known as Amnesty or AI) is a London-based non-governmental organization focused on human rights.

New!!: Cyberweapon and Amnesty International · See more »

Ashlee Vance

Ashlee Vance (born 1977) is an American business columnist and author.

New!!: Cyberweapon and Ashlee Vance · See more »

Botnet

A botnet is a number of Internet-connected devices, each of which is running one or more bots.

New!!: Cyberweapon and Botnet · See more »

Classified information

Classified information is material that a government body deems to be sensitive information that must be protected.

New!!: Cyberweapon and Classified information · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Cyberweapon and Computer virus · See more »

Cyber-arms industry

The cyber-arms industry is a term used to describe the markets and associated events surrounding the sale of software exploits, zero-days, cyberweaponry, surveillance technologies and related tools.

New!!: Cyberweapon and Cyber-arms industry · See more »

Cyberterrorism

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation.

New!!: Cyberweapon and Cyberterrorism · See more »

Cyberwarfare

Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks.

New!!: Cyberweapon and Cyberwarfare · See more »

Data breach

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

New!!: Cyberweapon and Data breach · See more »

Duqu

Duqu is a collection of computer malware discovered on 1 September 2011, thought to be related to the Stuxnet worm and to have been created by Unit 8200.

New!!: Cyberweapon and Duqu · See more »

Electromechanics

In engineering, electromechanics combines processes and procedures drawn from electrical engineering and mechanical engineering.

New!!: Cyberweapon and Electromechanics · See more »

Espionage

Espionage or spying, is the act of obtaining secret or confidential information without the permission of the holder of the information.

New!!: Cyberweapon and Espionage · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Cyberweapon and Exploit (computer security) · See more »

Flame (malware)

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.

New!!: Cyberweapon and Flame (malware) · See more »

Fourth-generation warfare

Fourth-generation warfare (4GW) is conflict characterized by a blurring of the lines between war and politics, combatants and civilians.

New!!: Cyberweapon and Fourth-generation warfare · See more »

Fraud

In law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

New!!: Cyberweapon and Fraud · See more »

Great Cannon

The Great Cannon of China is an attack tool that is used to launch distributed denial-of-service attacks on websites by intercepting massive amounts of web traffic and redirecting them to targeted websites.

New!!: Cyberweapon and Great Cannon · See more »

Intellectual property

Intellectual property (IP) is a category of property that includes intangible creations of the human intellect, and primarily encompasses copyrights, patents, and trademarks.

New!!: Cyberweapon and Intellectual property · See more »

Julian Assange

Julian Paul Assange (born Hawkins; 3 July 1971) is an Australian computer programmer and the editor of WikiLeaks.

New!!: Cyberweapon and Julian Assange · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Cyberweapon and Malware · See more »

Military

A military or armed force is a professional organization formally authorized by a sovereign state to use lethal or deadly force and weapons to support the interests of the state.

New!!: Cyberweapon and Military · See more »

Military intelligence

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions.

New!!: Cyberweapon and Military intelligence · See more »

Mirai (malware)

Mirai (Japanese for "the future", 未来) is a malware that turns networked devices running Linux into remotely controlled "bots" that can be used as part of a botnet in large-scale network attacks.

New!!: Cyberweapon and Mirai (malware) · See more »

Non-state actor

In international relations, non-state actors (NSAs) are individuals and groups that hold influence and which are wholly or partly independent of state governments.

New!!: Cyberweapon and Non-state actor · See more »

Open-source software

Open-source software (OSS) is a type of computer software whose source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.

New!!: Cyberweapon and Open-source software · See more »

Organized crime

Organized crime is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals who intend to engage in illegal activity, most commonly for money and profit.

New!!: Cyberweapon and Organized crime · See more »

Paramilitary

A paramilitary is a semi-militarized force whose organizational structure, tactics, training, subculture, and (often) function are similar to those of a professional military, but which is not included as part of a state's formal armed forces.

New!!: Cyberweapon and Paramilitary · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Cyberweapon and Password · See more »

Patch (computing)

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it.

New!!: Cyberweapon and Patch (computing) · See more »

Privacy

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.

New!!: Cyberweapon and Privacy · See more »

Proactive cyber defence

Proactive cyber defense or active cyber defense (ACD) means acting in anticipation to oppose an attack involving computers and networks.

New!!: Cyberweapon and Proactive cyber defence · See more »

Process control

Automatic process control in continuous production processes is a combination of control engineering and chemical engineering disciplines that uses industrial control systems to achieve a production level of consistency, economy and safety which could not be achieved purely by human manual control.

New!!: Cyberweapon and Process control · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Cyberweapon and Public-key cryptography · See more »

Rootkit

A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: Cyberweapon and Rootkit · See more »

Script kiddie

In programming and hacking culture, a script kiddie or skiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.

New!!: Cyberweapon and Script kiddie · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Cyberweapon and Security hacker · See more »

Self-replication

Self-replication is any behavior of a dynamical system that yields construction of an identical copy of itself.

New!!: Cyberweapon and Self-replication · See more »

Soldier

A soldier is one who fights as part of an army.

New!!: Cyberweapon and Soldier · See more »

Sovereign state

A sovereign state is, in international law, a nonphysical juridical entity that is represented by one centralized government that has sovereignty over a geographic area.

New!!: Cyberweapon and Sovereign state · See more »

Sovereignty

Sovereignty is the full right and power of a governing body over itself, without any interference from outside sources or bodies.

New!!: Cyberweapon and Sovereignty · See more »

Stuxnet

Stuxnet is a malicious computer worm, first uncovered in 2010.

New!!: Cyberweapon and Stuxnet · See more »

Trade secret

A trade secret is a formula, practice, process, design, instrument, pattern, commercial method, or compilation of information not generally known or reasonably ascertainable by others by which a business can obtain an economic advantage over competitors or customers.

New!!: Cyberweapon and Trade secret · See more »

Use of force

The use of force, in the context of law enforcement, may be defined as the "amount of effort required by police to compel compliance by an unwilling subject".

New!!: Cyberweapon and Use of force · See more »

Vault 7

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States Central Intelligence Agency to perform electronic surveillance and cyber warfare.

New!!: Cyberweapon and Vault 7 · See more »

Vector (malware)

A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer.

New!!: Cyberweapon and Vector (malware) · See more »

WikiLeaks

WikiLeaks is an international non-profit organisation that publishes secret information, news leaks, and classified media provided by anonymous sources.

New!!: Cyberweapon and WikiLeaks · See more »

Wiper (malware)

A wiper is a class of malware whose intention is to wipe the hard drive of the computer it infects.

New!!: Cyberweapon and Wiper (malware) · See more »

Zero-day (computing)

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).

New!!: Cyberweapon and Zero-day (computing) · See more »

Redirects here:

Cyber weapon.

References

[1] https://en.wikipedia.org/wiki/Cyberweapon

OutgoingIncoming
Hey! We are on Facebook now! »