[PDF][PDF] Public attribution of cyber intrusions

FJ Egloff - Journal of cybersecurity, 2020 - academic.oup.com
Attribution is central to the debate on how to respond to cyber intrusions. The policy
challenge is increasingly moving from identifying who is behind a cyber intrusion to finding …

Contested public attributions of cyber incidents and the role of academia

FJ Egloff - Contemporary Security Policy, 2020 - Taylor & Francis
Public attributions of cyber incidents by governments and private industry have become
prevalent in recent years. This article argues that they display a skewed version of cyber …

[PDF][PDF] Attribution and knowledge creation assemblages in cybersecurity politics

FJ Egloff, M Dunn Cavelty - Journal of Cybersecurity, 2021 - academic.oup.com
Attribution is central to cybersecurity politics. It establishes a link between technical
occurrences and political consequences by reducing the uncertainty about who is behind an …

Determinants of cyberattack prevention in UAE financial organizations: assessing the mediating role of cybersecurity leadership

NH Al-Kumaim, SK Alshamsi - Applied Sciences, 2023 - mdpi.com
Cyberattack prevention factors have a significant impact on the perception of social and
moral values in the business context. Despite leaders' significant role in encouraging and …

[HTML][HTML] Анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности при реализации целевых атак

И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

Digital force majeure: The Mondelez case, insurance, and the (un) certainty of attribution in cyberattacks

U Tatar, B Nussbaum, Y Gokce, OF Keskin - Business Horizons, 2021 - Elsevier
Insurance companies typically secure themselves under force majeure exclusions against
the unpredictability brought about by acts of war. If a company were to be attacked by a …

[PDF][PDF] Two explanations for the paucity of cyber-military, cross-domain operations

N Katagiri - Journal of Cybersecurity, 2022 - academic.oup.com
This article investigates why states have launched so few cross-domain operations—in this
case, operations between cyber and military domains—when they have launched so many …

[PDF][PDF] Explaining cyberspace dynamics in the covid era

N Katagiri - Global Studies Quarterly, 2022 - academic.oup.com
This article explores new cyberspace developments witnessed in the coronavirus disease
2019 (COVID) era and analyzes their significance relative to trajectories of pre-pandemic …

Unpacking Russia's Cyber-Incident Response

R Kolodii - Security Studies, 2024 - Taylor & Francis
Western states are increasingly holding foreign governments accountable for cyberattacks.
They couple public attribution of cyberattacks (PAC) with indictments, sanctions, and …

Discerning the Relative Threat of Different Network Based Cyber-Attacks, a Study of Motivation, Attribution, and Anonymity of Hackers

A Weathersby - 2023 - search.proquest.com
Important to defending a network from cyber-attack is knowing when one is occurring,
knowing the nature of the attack, its goals and being able to provide an appropriate …