|
|
Showing 1 - 1 of
1 matches in All Departments
Attribution - tracing those responsible for a cyber attack - is of
primary importance when classifying it as a criminal act, an act of
war, or an act of terrorism. Three assumptions dominate current
thinking: attribution is a technical problem; it is unsolvable; and
it is unique. Approaching attribution as a problem forces us to
consider it either as solved or unsolved. Yet attribution is far
more nuanced, and is best approached as a process in constant flux,
driven by judicial and political pressures. In the criminal
context, courts must assess the guilt of criminals, mainly based on
technical evidence. In the national security context,
decision-makers must analyse unreliable and mainly non-technical
information in order to identify an enemy of the state. Attribution
in both contexts is political: in criminal cases, laws reflect
society's prevailing norms and power; in national security cases,
attribution reflects a state's will to maintain, increase or assert
its power. However, both processes differ on many levels. The
constraints, which reflect common aspects of many other political
issues, constitute the structure of the book: the need for
judgement calls, the role of private companies, the standards of
evidence, the role of time, and the plausible deniability of
attacks.
|
You may like...
Kamikaze
Eminem
CD
R372
Discovery Miles 3 720
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.