Inside the Enemy's Computer Identifying Cyber Attackers【電子書籍】[ Clement Guitton ]

Inside the Enemy's Computer Identifying Cyber Attackers【電子書籍】[ Clement Guitton ]

SHOP:楽天Kobo電子書籍ストア
3,458円
(税込) (送料込) (カード利用可)

楽天市場で商品詳細を見る

<p>Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and powers; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, ...楽天市場のショップで商品詳細の続きを見る

Copyright © 本・雑誌・コミック館 送料0円.com 2009-. All Rights Reserved.
Supported by 楽天ウェブサービス  特定商取引法に基づく表記