Research Catalog

Inside the enemy's computer identifying cyber-attackers

Title
Inside the enemy's computer [electronic resource] : identifying cyber-attackers / Clement Guitton.
Author
Guitton, Clement
Publication
London : Hurst & Company, 2017.

Available Online

  • Available from home with a valid library card
  • Available onsite at NYPL

Details

Uniform Title
Inside the enemy's computer (Online)
Alternative Title
Inside the enemy's computer (Online)
Subject
  • Cyberterrorism
  • Cyberterrorism > Prevention
  • Hackers
Bibliography (note)
  • Includes bibliographical references (pages 255-289) and index.
Access (note)
  • Access restricted to authorized users.
LCCN
2017448034
OCLC
ssj0001957524
Author
Guitton, Clement.
Title
Inside the enemy's computer [electronic resource] : identifying cyber-attackers / Clement Guitton.
Imprint
London : Hurst & Company, 2017.
Description
1 online resource (x, 304 pages) : illustration.
Bibliography
Includes bibliographical references (pages 255-289) and index.
Access
Access restricted to authorized users.
Summary
Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.-- Provided by Publisher.
Connect to:
Available from home with a valid library card
Available onsite at NYPL
View in Legacy Catalog