Inside the Enemy's Computer : Identifying Cyber Attackers
Record details
- ISBN: 9780190862732
- ISBN: 9780190699994
-
Physical Description:
remote
1 online resource (316 pages) - Publisher: Oxford : Oxford University Press, Incorporated, 2017.
- Copyright: ©2017.
Content descriptions
Formatted Contents Note: | Cover -- Half-title -- Title -- Copyright -- Dedication -- Contents -- Acknowledgements -- Introduction -- 1. Modelling Attribution -- Attribution by the executive: a set of conditions for the model -- Two attribution processes: characteristics and deployed resources -- 2. Reliance on Judgement -- Attribution as an inescapable judgement call -- Political implications: authority and trust -- 3. Standards of Proof -- Domestic and international legal standards for attribution: a mismatch -- State sponsorship: malleable standards and misleading criteria -- 4. Private Companies -- Three factors used to undermine companies' credibility -- A significant role on the international scene -- 5. Time -- Measurable time: efforts to reduce it -- Time in terms of context for national security incidents -- 6. Plausible Deniability -- Sources of plausible deniability -- Strategic considerations for warranting plausible deniability -- Conclusion -- Notes -- Bibliography -- Index. |
Source of Description Note: | Description based on publisher supplied metadata and other sources. |
Search for related items by subject
Subject: | Hackers |
Genre: | Electronic books. |