Abstract

There are number of cases against the states among the cyber-attacks occurred in the recent years, when there was a breach of diplomatic secrets, confidential or personal data with various malicious aims from the perpetrator’s side. With the development of technologies, not only the frequency, but also the severity of such cyberattacks is rising, giving an alarm to the governments. The victims have been both developed and developing countries, including Georgia, which was one of the first to be addressed and the strong tactics of the malicious attack deserved to be noted by several cyber security experts. One of the methods of compromising information security is cyber espionage, which, as recent cases have demonstrated, is one of the most important cyber threats the states are facing. The focus of the article is on the aims of cyber espionage, as well as on the methods and means used by criminals to achieve malicious goals. In the process of demonstrating the goals, the reader will be shown relevant statistics and information on crime tactics. Well-known examples of cyber espionage and their consequences are presented. The case of cyber espionage against Georgia, which was one of the first in the world, is also considered. It is through such examples that we learn about experiences that, on the one hand, provide the basis for fear and, on the other hand, makes us able to think and develop a methodology for dealing with the threat. Finally, attention is drawn to the possible methods that can avoid such cases in the public administration and minimize the harmful consequences.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call