Jump to ContentJump to Main Navigation
Inside the Enemy's ComputerIdentifying Cyber Attackers$
Users without a subscription are not able to see the full content.

Clement Guitton

Print publication date: 2017

Print ISBN-13: 9780190699994

Published to Oxford Scholarship Online: August 2017

DOI: 10.1093/oso/9780190699994.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 20 September 2021



(p.1) Introduction
Inside the Enemy's Computer

Clement Guitton

Oxford University Press

The introduction sets to explain why it is important to look at the question of attribution: in short, it is central to defense and deterrence strategies. Furthermore, the introduction presents the different nuances of sponsorships to distinguish: from writing code without being aware of its intended malicious use, to states refusing to cooperate in investigations. The chapter goes on with exposing three common misconceptions that have permeated the debate on attribution: that it is a technical problem; that it is unsolvable; and that it is unique. These misconceptions will be debunked in turns throughout the remaining chapters. Finally, the chapter summarizes the argument and key terms such as "attribution" and cyber attacks.

Keywords:   Attribution, Cyber attacks, Defense, Deterrence

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .