Jump to ContentJump to Main Navigation
Inside the Enemy's ComputerIdentifying Cyber Attackers$
Users without a subscription are not able to see the full content.

Clement Guitton

Print publication date: 2017

Print ISBN-13: 9780190699994

Published to Oxford Scholarship Online: August 2017

DOI: 10.1093/oso/9780190699994.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 25 September 2021



(p.183) Conclusion
Inside the Enemy's Computer

Clement Guitton

Oxford University Press

The conclusion starts by summarizing the contributions of this book, before considering what the future of attribution may look like. It briefly analyzes the consequences for privacy of large metadata collection, and the effects on Internet governance of attribution mechanisms being revealed. More specifically, it contends that the potential breaking up of the Internet into multiple ‘Internets’ will reshape the practice of cyber security to some extent, but that the political limitations of attribution will remain very similar. This last chapter also briefly outlines the basis for future work by showing that attribution is not only limited to cyber attacks but also emerges in many other situations, involving the need to strike a "right" balance between anonymity, privacy and security, which is one of the key challenges of the twenty-first century. Hence, the approach to attribution will reflect how society wishes to address the anonymity-privacy-security triangle, and how it has the potential to shape the balance between these three questions for years to come.

Keywords:   Metadata, Internet governance, Anonymity, Privacy, Cyber attacks

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .