Publicly attributing cyber attacks: a framework

نویسندگان

چکیده

When should states publicly attribute cyber intrusions? Whilst this is a question governments increasingly grapple with, academia has hardly helped in providing answers. This article describes the stages of public attribution and provides Public Attribution Framework designed to explain, guide, improve decision making by states. Our general argument that highly complex process which requires trade-offs multiple considerations. Effective not only necessitates clear understanding attributed operation threat actor, but also broader geopolitical environment, allied positions activities, legal context. implies more always better. carries significant risks, are often badly understood. We propose maker’s attitude towards be one ‘strategic, coordinated pragmatism’. – as part strategy can successful if there consistent goal, whilst avenues for potential negative counter effects assessed on case-by-case basis.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Statistical Framework for Analyzing Cyber Attacks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Res...

متن کامل

A Deception Framework for Survivability Against Next Generation Cyber Attacks

Over the years, malicious entities in cyber-space have grown smarter and resourceful. For defenders to stay abreast of the increasingly sophisticated attacks, the need is to understand these attacks. In this paper, we study the current trends in security attacks and present a threat model that encapsulates their sophistication. Survivability is difficult to achieve because of its contradictory ...

متن کامل

Cyber attacks: awareness

7. Geosynchronous Orbital Ion Cannon source code. Accessed Jan 2011. . 8. Moyer, E. ‘Report: FBI seizes server in probe of Wikileaks attacks’. CNET, 1 Jan 2011. Accessed Jan 2011. . 9. ‘Jester’s Court’. . 10.Leyden, J. ‘Anonymous hacktivists fire ion cannons at Zimbabwe’. The Regi...

متن کامل

STARMINE: a visualization system for cyber attacks

In cyber attack monitoring systems, various types of visualizations, such as geographical visualization, temporal visualization, logical visualization, are being used. Each visualization has its own advantages and disadvantages. Since it is important to analyze the information from different viewpoints and to make a right decision in practical cyber attack monitoring, these visualization should...

متن کامل

Global Mapping of Cyber Attacks

Identifying factors behind countries’ weakness to cyber-attacks is an important step towards addressing these weaknesses at the root level. For example, identifying factors why some countries become cybercrime safe heavens can inform policy actions about how to reduce the attractiveness of these countries to cyber-criminals. Currently, however, identifying these factors is mostly based on exper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Strategic Studies

سال: 2021

ISSN: ['1743-937X', '0140-2390']

DOI: https://doi.org/10.1080/01402390.2021.1895117