Publicly attributing cyber attacks: a framework
نویسندگان
چکیده
When should states publicly attribute cyber intrusions? Whilst this is a question governments increasingly grapple with, academia has hardly helped in providing answers. This article describes the stages of public attribution and provides Public Attribution Framework designed to explain, guide, improve decision making by states. Our general argument that highly complex process which requires trade-offs multiple considerations. Effective not only necessitates clear understanding attributed operation threat actor, but also broader geopolitical environment, allied positions activities, legal context. implies more always better. carries significant risks, are often badly understood. We propose maker’s attitude towards be one ‘strategic, coordinated pragmatism’. – as part strategy can successful if there consistent goal, whilst avenues for potential negative counter effects assessed on case-by-case basis.
منابع مشابه
A Statistical Framework for Analyzing Cyber Attacks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Res...
متن کاملA Deception Framework for Survivability Against Next Generation Cyber Attacks
Over the years, malicious entities in cyber-space have grown smarter and resourceful. For defenders to stay abreast of the increasingly sophisticated attacks, the need is to understand these attacks. In this paper, we study the current trends in security attacks and present a threat model that encapsulates their sophistication. Survivability is difficult to achieve because of its contradictory ...
متن کاملCyber attacks: awareness
7. Geosynchronous Orbital Ion Cannon source code. Accessed Jan 2011. . 8. Moyer, E. ‘Report: FBI seizes server in probe of Wikileaks attacks’. CNET, 1 Jan 2011. Accessed Jan 2011. . 9. ‘Jester’s Court’. . 10.Leyden, J. ‘Anonymous hacktivists fire ion cannons at Zimbabwe’. The Regi...
متن کاملSTARMINE: a visualization system for cyber attacks
In cyber attack monitoring systems, various types of visualizations, such as geographical visualization, temporal visualization, logical visualization, are being used. Each visualization has its own advantages and disadvantages. Since it is important to analyze the information from different viewpoints and to make a right decision in practical cyber attack monitoring, these visualization should...
متن کاملGlobal Mapping of Cyber Attacks
Identifying factors behind countries’ weakness to cyber-attacks is an important step towards addressing these weaknesses at the root level. For example, identifying factors why some countries become cybercrime safe heavens can inform policy actions about how to reduce the attractiveness of these countries to cyber-criminals. Currently, however, identifying these factors is mostly based on exper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Strategic Studies
سال: 2021
ISSN: ['1743-937X', '0140-2390']
DOI: https://doi.org/10.1080/01402390.2021.1895117