9783662613153-3662613158-Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

ISBN-13: 9783662613153
ISBN-10: 3662613158
Edition: 1st ed. 2020
Author: Timo Steffens
Publication date: 2021
Publisher: Springer Vieweg
Format: Paperback 220 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $47.19 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $65.86 USD
Buy

From $61.27

Rent

From $47.19

Book details

ISBN-13: 9783662613153
ISBN-10: 3662613158
Edition: 1st ed. 2020
Author: Timo Steffens
Publication date: 2021
Publisher: Springer Vieweg
Format: Paperback 220 pages

Summary

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage (ISBN-13: 9783662613153 and ISBN-10: 3662613158), written by authors Timo Steffens, was published by Springer Vieweg in 2021. With an overall rating of 4.4 stars, it's a notable title among other Internet & Networking (Hardware & DIY, Internet, Groupware, & Telecommunications, Networking & Cloud Computing, Network Security, Security & Encryption, Hacking, Privacy & Online Safety, Science & Technology, Legal Theory & Systems) books. You can easily purchase or rent Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage (Paperback) from BooksRun, along with many other new and used Internet & Networking books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $1.56.

Description

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.

Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.

This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book