Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Unavailable
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
Unavailable
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
Unavailable
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
Ebook192 pages2 hours

Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example

Rating: 0 out of 5 stars

()

Currently unavailable

Currently unavailable

About this ebook

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Malicious cyber actors exploit gaps in technology and international cybersecurity cooperation to launch multistage, multi-jurisdictional attacks. Rather than consider technical attribution the challenge, a more accurate argument would be that "solutions to preventing the attacks of most concern, multistage multi-jurisdictional ones, will require not only technical methods, but legal/policy solutions as well." Deep understanding of the social, cultural, economic, and political dynamics of the nation-states where cyber threat actors operate is currently lacking. This project aims to develop a qualitative framework to guide US policy responses to states that are either origin or transit countries of cyber attacks.

The current focus of attribution efforts within the national security context concentrates on law enforcement paradigms aiming to gather evidence to prosecute an individual attacker. This is usually dependent on technical means of attribution. In malicious cyber actions, spoofing or obfuscation of an identity most often occurs. It is not easy to know who conducts malicious cyber activity. But private sector reports have proven that it is possible to determine the geographic reference of threat actors to varying degrees.

Executive Summary * Chapter 1 - Introduction * Chapter 2 - The Cyber Environment * A Holistic View of Cyberspace * Multistage, Multijurisdictional Attacks * Spoofing Machines to Mask Geography * Chapter 3 - American Sponsorship of Embryonic Global Norms * American Sponsorship of Global Norms * The Anti-trafficking-in-Persons Initiative * The Global Culture of Cybersecurity and Embryonic Norms for State Responsibility in Cyberspace * The Global Cybersecurity Behavioral Baseline * The WSIS and Global Cybersecurity * Internationally Wrongful Acts in Cyberspace * Chapter 4 - A Framework for Development, Diplomacy, and Defense * Development, Diplomacy, and Defense Responses * A Need for Norms on Cyber Weapons * Language for "Victims of Trafficking in Malicious Code" Legislation * Leading by Example: US-based Entities' Responsibility * Chapter 5 - Conclusion * "Where Do We Go from Here? * Linking It All Together * Abbreviations

LanguageEnglish
Release dateSep 5, 2016
ISBN9781370087068
Unavailable
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
Author

Progressive Management

Progressive Management: For over a quarter of a century, our news, educational, technical, scientific, and medical publications have made unique and valuable references accessible to all people. Our imprints include PM Medical Health News, Advanced Professional Education and News Service, Auto Racing Analysis, and World Spaceflight News. Many of our publications synthesize official information with original material. They are designed to provide a convenient user-friendly reference work to uniformly present authoritative knowledge that can be rapidly read, reviewed or searched. Vast archives of important data that might otherwise remain inaccessible are available for instant review no matter where you are. The e-book format makes a great reference work and educational tool. There is no other reference book that is as convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from renowned experts you trust. Our e-books put knowledge at your fingertips, and an expert in your pocket!

Related to Strategies for Resolving the Cyber Attribution Challenge

Related ebooks

Wars & Military For You

View More

Related articles

Reviews for Strategies for Resolving the Cyber Attribution Challenge

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words