首页> 外文期刊>Journal of Strategic Studies >Attributing Cyber Attacks
【24h】

Attributing Cyber Attacks

机译:归因于网络攻击

获取原文
获取原文并翻译 | 示例
       

摘要

Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
机译:谁干的?归因至关重要。人的生命和国家安全可能取决于代理人的代理权。在计算机网络入侵的情况下,归因通常被视为最棘手的技术问题之一,可以解决还是不能解决,并且主要取决于现有的法证证据。但是吗?这是对归属的有效理解吗? -本文认为归因是国家对其的归宿。为了演示如何进行,我们引入了Q模型:旨在解释,指导和改善归因的方法。使罪犯与犯罪相匹配是一种在三个层面上最大程度地减少不确定性的练习:战术上,归因是一门艺术,也是一门科学;在操作上,归因是一个细微的过程,而不是一个黑白问题;从战略上讲,归因是政治利益的函数。成功的归因需要各种水平的技能,谨慎的管理,时间,领导才能,压力测试,谨慎的沟通以及意识到局限性和挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号