Atjaunināt sīkdatņu piekrišanu

E-grāmata: Inside the Enemy's Computer: Identifying Cyber Attackers

  • Formāts: EPUB+DRM
  • Izdošanas datums: 01-Aug-2017
  • Izdevniecība: OUP India
  • Valoda: eng
  • ISBN-13: 9780190862640
  • Formāts - EPUB+DRM
  • Cena: 20,80 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 01-Aug-2017
  • Izdevniecība: OUP India
  • Valoda: eng
  • ISBN-13: 9780190862640

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and powers; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Acknowledgements ix
Introduction 1(28)
1 Modelling Attribution
29(36)
Attribution by the executive: a set of conditions for the model
31(15)
Two attribution processes: characteristics and deployed resources
46(19)
2 Reliance on Judgement
65(20)
Attribution as an inescapable judgement call
67(9)
Political implications: authority and trust
76(9)
3 Standards of Proof
85(26)
Domestic and international legal standards for attribution: a mismatch
86(6)
State sponsorship: malleable standards and misleading criteria
92(19)
4 Private Companies
111(26)
Three factors used to undermine companies' credibility
113(11)
A significant role on the international scene
124(13)
5 Time
137(26)
Measurable time: efforts to reduce it
138(13)
Time in terms of context for national security incidents
151(12)
6 Plausible Deniability
163(20)
Sources of plausible deniability
164(9)
Strategic considerations for warranting plausible deniability
173(10)
Conclusion 183(18)
Notes 201(54)
Bibliography 255(36)
Index 291