Attribution: A Puzzle

By Martin Lee, Paul Rascagneres and Vitor Ventura.

Introduction
The attribution of cyber attacks is hard. It requires collecting diverse intelligence, analyzing it and deciding who is responsible. Rarely does the evidence available to researchers reach a level of proof that would be acceptable in a court of law.

Nevertheless, the private sector rises to the challenge to attempt to associate cyber attacks to threat actors using the intelligence available to them. This intelligence takes the…

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Go to Source
Author:

You may also like...