Jump to ContentJump to Main Navigation
Inside the Enemy's ComputerIdentifying Cyber Attackers$
Users without a subscription are not able to see the full content.

Clement Guitton

Print publication date: 2017

Print ISBN-13: 9780190699994

Published to Oxford Scholarship Online: August 2017

DOI: 10.1093/oso/9780190699994.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see http://www.oxfordscholarship.com/page/privacy-policy).date: 27 May 2018

Private Companies

Private Companies

Chapter:
(p.111) 4 Private Companies
Source:
Inside the Enemy's Computer
Author(s):

Clement Guitton

Publisher:
Oxford University Press
DOI:10.1093/oso/9780190699994.003.0005

What specific constraints do private companies face? What is the role of private companies in outing state-sponsored attacks? States accused of cyber attacks use three commonly recurring arguments to try to undermine claims by private companies—but as with judgment inherent to attribution, these arguments are based on characteristics inherent to the functioning of cyber security companies. Accused states attempt to bring into question the companies’ independence, and so to undermine the validity of their claims. To do so, they point out that many former government officials work for the company in question; that the timing of reports being published can appear to be in support of a government’s policies; and that companies are not always keen on attributing any attacks at all, and are focused only on particular, official enemies of the state. This chapter will verify the strength of these arguments. It concludes that such critiques of private companies often lack an evidence base, exaggerate certain points, and can read at times closer to conspiracy theory than to serious counterarguments.

Keywords:   Attribution, Cyber security companies, Private companies

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .