Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal ...
Read More
Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Read Less
Add this copy of Inside the Enemy's Computer: Identifying Cyber to cart. $7.99, good condition, Sold by Wonder Book - Member ABAA/ILAB rated 5.0 out of 5 stars, ships from Frederick, MD, UNITED STATES, published 2017 by Oxford University Press, USA.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Good condition. Very Good dust jacket. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains.
Add this copy of Inside the Enemy's Computer: Identifying Cyber to cart. $25.63, very good condition, Sold by John C. Newland rated 4.0 out of 5 stars, ships from Cheltenham, Glos., UNITED KINGDOM, published 2017 by C Hurst & Co.
Add this copy of Inside the Enemy's Computer: Identifying Cyber Att to cart. $29.59, new condition, Sold by indoo rated 4.0 out of 5 stars, ships from Avenel, NJ, UNITED STATES, published 2017 by Oxford University Press, USA.
Add this copy of Inside the Enemy's Computer: Identifying Cyber to cart. $36.73, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2017 by Oxford University Press, USA.
Add this copy of Inside the Enemy's Computer: Identifying Cyber to cart. $52.19, new condition, Sold by Booksplease rated 3.0 out of 5 stars, ships from Southport, MERSEYSIDE, UNITED KINGDOM, published 2017 by C Hurst & Co Publishers Ltd.