Inside the Enemy's Computer

Regular price €38.99
Quantity:
Ships in 10-20 days
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Clement Guitton
Age Group_Uncategorized
Age Group_Uncategorized
Author_Clement Guitton
automatic-update
Category1=Non-Fiction
Category=UR
COP=United Kingdom
Delivery_Delivery within 10-20 working days
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Language_English
PA=Available
Price_€20 to €50
PS=Active
softlaunch

Product details

  • ISBN 9781849045544
  • Dimensions: 145 x 225mm
  • Publication Date: 26 Jan 2017
  • Publisher: C Hurst & Co Publishers Ltd
  • Publication City/Country: GB
  • Product Form: Hardback
  • Language: English
Secure checkout Fast Shipping Easy returns
Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Clement Guitton is a former analyst with the Department of Defence, Switzerland; he is now an assistant manager for cyber security at PwC.

More from this author