Misplaced Pages

Cyber attribution

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Attribution of a cybercrime

In the area of computer security, cyber attribution is an attribution of cybercrime, i.e., finding who perpetrated a cyberattack. Uncovering a perpetrator may give insights into various security issues, such as infiltration methods, communication channels, etc., and may help in enacting specific countermeasures. Cyber attribution is a costly endeavor requiring considerable resources and expertise in cyber forensic analysis.

Nissim Ben Saadon argues that the task of cyber attribution makes sense for major organizations: government agencies and major businesses in sensitive domains, such as healthcare and state infrastructures. However most small and medium businesses (SMB) gain little in "postmortem" identification of perpetrators. In BEn Saadon's opinion, it is unlikely that a particular SMB was specifically targeted; rather the incident was a crime of opportunity, exploiting a detected vulnerability, and with limited resources it is wiser to spend it on identifying the vulnerability in question and eliminating it.

For governments and other major players dealing with cybercrime would require not only technical solutions, but legal and political ones as well, and for the latter ones cyber attribution is crucial.

Attributing a cyberattack is difficult, and of limited interest to companies that are targeted by cyberattacks. In contrast, secret services often have a compelling interest in finding out whether a state is behind the attack. A further challenge in attribution of cyberattacks is the possibility of a false flag attack, where the actual perpetrator makes it appear that someone else caused the attack. Every stage of the attack may leave artifacts, such as entries in log files, that can be used to help determine the attacker's goals and identity. In the aftermath of an attack, investigators often begin by saving as many artifacts as they can find, and then try to determine the attacker.

See also

References

  1. ^ Johnson, Emily (2020). "Cyber Attribution: Technical and Legal Challenges". Computers & Security. 95. doi:10.1093/ejil/chaa057. Retrieved October 8, 2024.
  2. ^ Yannakogeorgos, Panayotis A. (2017). Strategies for Resolving the Cyber Attribution Challenge (PDF) (Report). Maxwell Air Force Base, Alabama: Air University Press. Retrieved October 8, 2024.
  3. ^ Skopik & Pahi 2020, p. 1.
  4. Skopik & Pahi 2020, pp. 1, 6.
  5. Skopik & Pahi 2020, p. 12.
  6. Skopik & Pahi 2020, p. 16.

Further reading

Stub icon

This computer security article is a stub. You can help Misplaced Pages by expanding it.

Categories: