Public attribution of cyber intrusions

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing Lawful Responses to Cyber Intrusions

Cyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic and international legal regimes. Each of these regimes has unique limitations, but also offers unique opportunities for evidence collection, intelligence gathering, and use ...

متن کامل

Cyber Attribution: An Argumentation-Based Approach

Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. In this paper, we introduce a formal...

متن کامل

Attribution Of Cyber Attacks On Process Control Systems

The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step to...

متن کامل

Attribution of Cyber Attacks on Industrial Control Systems

In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse. In this paper we identify the current state of the art of attribution in industrial control systems. We highlight the critical ...

متن کامل

Temporary Territories?: Responses to Intrusions in a Public Setting

Do people create temporary territories in public settings? To address this question, territorial cognitions and behaviors regarding two types of study sites in a library--tables and carrels--were investigated. In the first questionnaire experiment subjects indicated that: carrel sites were more valuable for studying than table sites; they expected they would be more likely to defend a carrel si...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cybersecurity

سال: 2020

ISSN: 2057-2085,2057-2093

DOI: 10.1093/cybsec/tyaa012