Inside the enemy's computer : identifying cyber-attackers / Clement Guitton.
By: Guitton, Clement [author.].
Publisher: London : Hurst & Company, 2017Copyright date: ©2017Description: x, 304 pages : illustration ; 23 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780190699994.Subject(s): Cyberterrorism | Cyberterrorism -- Prevention | Hackers | Cyberterrorism | Cyberterrorism -- Prevention | HackersGenre/Form: Print books.Summary: Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.--Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | HV6773.15.C97 G85 2017 (Browse shelf) | Available | AU00000000012144 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
HV6773 .V36 2023 The unhackable internet : how rebuilding cyberspace can create real security and prevent financial collapse / | HV6773 .W655 2018 You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches / | HV6773.15.C92 S36 2016 Online health and safety : from cyberbullying to internet addiction / | HV6773.15.C97 G85 2017 Inside the enemy's computer : identifying cyber-attackers / | HV6773.15.C97 M53 2017 A history of cyber security attacks : 1980 to present / | HV6773.15.C97 S36 2019 The perfect weapon : war, sabotage, and fear in the cyber age / | HV6773.15.C97 V35 2018 Cyber strategy : the evolving character of power and coercion / |
Includes bibliographical references (pages 255-289) and index.
Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.--