首页> 外文期刊>Silicon Chip >A BRIEF HISTORY OF CYBER ESPIONAGE AND CYBER WEAPONS Part 1-espionage methods over the years-by Dr David Maddison
【24h】

A BRIEF HISTORY OF CYBER ESPIONAGE AND CYBER WEAPONS Part 1-espionage methods over the years-by Dr David Maddison

机译:多年来,Cyber Espionage和Cyber武器的简要历史 - 博士多瓦博士

获取原文
获取原文并翻译 | 示例
       

摘要

Spying on one's enemies(or even one's friends!)or sabotaging infrastructure is one of humanity's oldest activities,but electronics vastly expanded the possible ways of doing so.In this article,we'll describe some fascinating espionage methods that can be(and have been)used to take advantage of hidden flaws in everyday equipment,allowing spies to get their hands on all sorts of secret information.Naturally,many such techniques are secret,but there are still many that have been described in the open literature,that we explain below.The variety of technologies and methods of concealment of electronic espionage is immense,so we can only survey a portion of those,and give the most interesting examples.The number of ways people have devised to spy on each other is seemingly only limited by the imagination.We've come up with so many interesting electronic espionage techniques that this article will concentrate on those which exploit vulnerabilities in electronics and hardware,and techniques for creating vulnerabilities which can then be exploited later.Next month,we'll have a follow-up article covering other electronic spying techniques,which we don't have room for in this article.
机译:窥探一个人的敌人(甚至是一个人的朋友!)或破坏基础设施是人类最古老的活动之一,但电子产品大大扩大了所做的方式。在本文中,我们将描述一些可以是(并拥有的迷人的间谍方法曾经用过的是在日常装备中利用隐藏的缺陷,让间谍让他们的双手放在各种各样的秘密信息。并且许多这样的技术都是秘密的,但是在开放文学中仍有许多这些技术,我们下面解释。电子间谍电子的各种技术和隐藏方法是巨大的,所以我们只能调查其中一部分,并给予最有趣的例子。人们设计为彼此间谍的方式似乎只有有限通过想象力。我们提出了这么多有趣的电子间谍技术,这篇文章将专注于那些利用电子和硬件漏洞的人,以及技术或者创建可以稍后利用的漏洞。将有一个涵盖其他电子间谍技术的后续文章,我们在本文中没有空间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号