Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage / Timo Steffens.
An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of s...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English German |
Published: |
Berlin, Germany :
Springer Vieweg,
[2020]
|
Subjects: |
Table of Contents:
- Introduction: Advanced persistent threats
- The attribution process.
- Attribution methods: Analysis of malware
- Attack infrastructure
- Analysis of control servers
- Geopolitical analysis
- Telemetry : data from security products
- Methods of intelligence agencies
- Doxing
- False flags
- Group set-ups.
- Strategical aspects: Communication
- Ethics of attribution
- Conclusion and outlook.