Chapter

Attribution: Attacks

Susan W. Brenner

in Cyber Threats

Published in print March 2009 | ISBN: 9780195385014
Published online September 2009 | e-ISBN: 9780199855414 | DOI: https://dx.doi.org/10.1093/acprof:oso/9780195385014.003.0004
Attribution: Attacks

Show Summary Details

Preview

This chapter begins with a description of cyberattacks against the U.S. Department of Commerce's Bureau of Industry and Security (BIS) in the summer of 2006. The attackers sought access to BIS employee user accounts, presumably to obtain data concerning BIS operations. They penetrated the BIS' system with a “rootkit” program, a type of software that lets attackers conceal their presence and gain privileged but unauthorized access to a computer system. It then argues that the approaches currently used for attribution and response are becoming increasingly unsatisfactory as cyberspace becomes a viable vector for attacks of whatever type. We must, therefore, either (a) modify the existing, general approach we use for real-world threat attribution and response so it also encompasses cyberthreats or (b) develop a supplementary, specialized approach for cyberthreat attribution and response.

Keywords: cyberattacks; attack attribution; Bureau of Industry and Security; response

Chapter.  24331 words. 

Subjects: Criminal Law

Full text: subscription required

How to subscribe Recommend to my Librarian

Buy this work at Oxford University Press »

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content. subscribe or login to access all content.