Inside the Enemy's Computer: Identifying Cyber Attackers
Author | : | |
Rating | : | 4.31 (973 Votes) |
Asin | : | 019069999X |
Format Type | : | paperback |
Number of Pages | : | 320 Pages |
Publish Date | : | 2017-10-18 |
Language | : | English |
DESCRIPTION:
Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war
Clement Guitton is a former analyst with the Department of Defence, Switzerland; he is now an assistant manager for cyber security at PwC.
Clement Guitton's book is an invaluable guide to attributing cyber attacks. Inside the Enemy's Computer adds much-needed attention to detail, historical depth, and conceptual clarity." -- Thomas Rid, Professor in War Studies, King's College London, and author of Cyber War Will Not Take Place"If you believe attribution in cyberspace is a technical problem, that it cannot be solved, and that it is unlike anything in the physical world, then you must read this illuminating book. It gets even harder in high-profile computer network breaches. "Who did it? This is one of the hardest questions of any investig