منابع مشابه
Optimizing Lawful Responses to Cyber Intrusions
Cyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic and international legal regimes. Each of these regimes has unique limitations, but also offers unique opportunities for evidence collection, intelligence gathering, and use ...
متن کاملCyber Attribution: An Argumentation-Based Approach
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or signals intelligence) is a difficult problem not only due to the effort required to obtain evidence, but the ease with which an adversary can plant false evidence. In this paper, we introduce a formal...
متن کاملAttribution Of Cyber Attacks On Process Control Systems
The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step to...
متن کاملAttribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse. In this paper we identify the current state of the art of attribution in industrial control systems. We highlight the critical ...
متن کاملTemporary Territories?: Responses to Intrusions in a Public Setting
Do people create temporary territories in public settings? To address this question, territorial cognitions and behaviors regarding two types of study sites in a library--tables and carrels--were investigated. In the first questionnaire experiment subjects indicated that: carrel sites were more valuable for studying than table sites; they expected they would be more likely to defend a carrel si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cybersecurity
سال: 2020
ISSN: 2057-2085,2057-2093
DOI: 10.1093/cybsec/tyaa012