• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Security First Associates

Security Clearance CAN Change Your Life!

  • Home
  • About
    • Community Service
    • Media Room
    • Press Releases
      • Griffin wins Sam Walton Emerging Entrepreneurs Awards; Company will receive full package of Financial and Other Assistance Columbia, MD
      • Top Entrepreneur in Security Field spotlighted by National Magazine; Self-Employed “Secret Agent” Griffin for tips.
      • NCMS Society Award for 2020
    • Testimonials
  • Sign In Compliance
  • Our Services
  • Managed Security Support
  • RMF Help
  • FSO & AFSO Help
  • Facility Clearance Help
  • Shop
    • Social Media Secrets Every Parent of College Bound Teens Must Know
    • Protecting Your Teens on Facebook
    • Safe Text: Protecting Your Teens from the Dangers of Texting
  • Blog
  • Contact
You are here: Home / Security Focus Blog / WHAT’S THE DIFFERENCE BETWEEN Cyber Warfare and Cyber Espionage

February 25, 2014 By Diane

WHAT’S THE DIFFERENCE BETWEEN Cyber Warfare and Cyber Espionage

Do you know the difference between Cyber Warfare and Cyber Espionage?

Published reports about foreign hackers attacking major organizations should not be mistaken for cyber warfare. These attacks are acts of cyber espionage. CYBER ESPIONAGE  unfolds over months or years. CYBER WARFARE is different. The attack is usually quick, with strikes occurring within seconds and causing damage which leads to other objectives.  Cyber warfare is fighting on an electronic battlefield with digital weapons. It entails attacking an adversary’s capabilities in an effort to destroy or disable their ability to get things done.

Cyber warfare attacks are completely digital in nature. Attacks are aimed communication systems, information systems or the electronics that monitor/control physical infrastructure (power and water systems). Cyber espionage is obtaining secret information from an adversary and using that information to gain some strategic advantage.  If the information gathered does not have a special value, it is useless.

Adversaries may use information gathered via cyber espionage to gain financial or competitive advantages in the business world or strategic advantage over political communities of conflict.  Cyber espionage is routinely a precursor to a Cyber warfare strike.  A cyber espionage event allows an adversary to do reconnaissance before an all-out Cyber warfare attack. This is similar to the military sending out a recon patrol to disable an enemy’s capabilities before a major attack or sending a spy into the enemy territory to gather Intel before the strike.

Comments?  We live for them!

Security First & Associates

www.securityfirstassociates.com

Filed Under: Security Focus Blog Tagged With: ASIS, Cyber, cyber security, Government Security clearance

Primary Sidebar

Let’s Connect

  • Email
  • Facebook
  • LinkedIn
  • Twitter

Join Our Mailing List

FREE! What’s In It For Me? How Security Clearance Can Change Your Life eBook!

Recent Posts

  • The Clearance Headache: Why Small Businesses Struggle with Security Clearances
  • Top 3 Mistakes Companies Make When Applying for Their Facility Clearance (FCL)
  • Hoops and Heroes: Facility Security Officers & March Madness Compliance
  • A Quick Stress Break
  • Looking for Love? Be Aware of Romance Scams!

Footer

Have A Question?

Security First & Associates

5850 Waterloo Road

Suite 140

Columbia, MD 21045

Toll Free: 866-661-5211

Quick Links

Are You Ready for Managed Security Support Services?
Managed Security Support Application

Let’s Connect

  • Email
  • Facebook
  • LinkedIn
  • Twitter

Home | About Us | Our Services | Blog | Privacy Policy

Copyright © 2011 - 2018 Security First Associates · All Rights Reserved