Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage / Timo Steffens.

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of s...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Skillsoft)
Main Author: Steffens, Timo (Author)
Format: Electronic eBook
Language:English
German
Published: Berlin, Germany : Springer Vieweg, [2020]
Subjects:
Table of Contents:
  • Introduction: Advanced persistent threats
  • The attribution process.
  • Attribution methods: Analysis of malware
  • Attack infrastructure
  • Analysis of control servers
  • Geopolitical analysis
  • Telemetry : data from security products
  • Methods of intelligence agencies
  • Doxing
  • False flags
  • Group set-ups.
  • Strategical aspects: Communication
  • Ethics of attribution
  • Conclusion and outlook.