Attribution of Advanced Persistent Threats

Attribution of Advanced Persistent Threats
Author: Timo Steffens
Publisher: Springer Nature
Total Pages: 207
Release: 2020-07-20
Genre: Computers
ISBN: 3662613131

Download Attribution of Advanced Persistent Threats Book in PDF, Epub and Kindle

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.


Attribution of Advanced Persistent Threats
Language: en
Pages: 207
Authors: Timo Steffens
Categories: Computers
Type: BOOK - Published: 2020-07-20 - Publisher: Springer Nature

GET EBOOK

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
Language: en
Pages: 65
Authors: Nicolae Sfetcu
Categories: True Crime
Type: BOOK - Published: 2024-06-22 - Publisher: MultiMedia Publishing

GET EBOOK

This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and d
Malware Data Science
Language: en
Pages: 274
Authors: Joshua Saxe
Categories: Computers
Type: BOOK - Published: 2018-09-25 - Publisher: No Starch Press

GET EBOOK

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "b
Cyber Security
Language: en
Pages: 177
Authors: Xiaochun Yun
Categories: Computer networks
Type: BOOK - Published: 2019-01-01 - Publisher: Springer

GET EBOOK

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, i
Cyber Mercenaries
Language: en
Pages: 267
Authors: Tim Maurer
Categories: Law
Type: BOOK - Published: 2018-01-18 - Publisher: Cambridge University Press

GET EBOOK

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have be