Attribution of Advanced Persistent Threats

Attribution of Advanced Persistent Threats
Author :
Publisher : Springer Nature
Total Pages : 207
Release :
ISBN-10 : 9783662613139
ISBN-13 : 3662613131
Rating : 4/5 (131 Downloads)

Book Synopsis Attribution of Advanced Persistent Threats by : Timo Steffens

Download or read book Attribution of Advanced Persistent Threats written by Timo Steffens and published by Springer Nature. This book was released on 2020-07-20 with total page 207 pages. Available in PDF, EPUB and Kindle. Book excerpt: An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.


Attribution of Advanced Persistent Threats Related Books

Attribution of Advanced Persistent Threats
Language: en
Pages: 207
Authors: Timo Steffens
Categories: Computers
Type: BOOK - Published: 2020-07-20 - Publisher: Springer Nature

GET EBOOK

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of
Malware Data Science
Language: en
Pages: 274
Authors: Joshua Saxe
Categories: Computers
Type: BOOK - Published: 2018-09-25 - Publisher: No Starch Press

GET EBOOK

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "b
Cyber Security
Language: en
Pages: 184
Authors: Xiaochun Yun
Categories: Computers
Type: BOOK - Published: 2019-02-19 - Publisher: Springer

GET EBOOK

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, i
Intelligence-Driven Incident Response
Language: en
Pages: 286
Authors: Scott J Roberts
Categories: Computers
Type: BOOK - Published: 2017-08-21 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.
Data Mining
Language: en
Pages: 226
Authors:
Categories: Computers
Type: BOOK - Published: 2022-03-30 - Publisher: BoD – Books on Demand

GET EBOOK

The availability of big data due to computerization and automation has generated an urgent need for new techniques to analyze and convert big data into useful i