Jump to ContentJump to Main Navigation
Cyber ThreatsThe Emerging Fault Lines of the Nation State$
Users without a subscription are not able to see the full content.

Susan W Brenner

Print publication date: 2009

Print ISBN-13: 9780195385014

Published to Oxford Scholarship Online: September 2009

DOI: 10.1093/acprof:oso/9780195385014.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2019. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 20 May 2019

Attribution: Attacks

Attribution: Attacks

(p.71) Chapter 4 Attribution: Attacks
Cyber Threats

Susan W. Brenner

Oxford University Press

This chapter begins with a description of cyberattacks against the U.S. Department of Commerce's Bureau of Industry and Security (BIS) in the summer of 2006. The attackers sought access to BIS employee user accounts, presumably to obtain data concerning BIS operations. They penetrated the BIS' system with a “rootkit” program, a type of software that lets attackers conceal their presence and gain privileged but unauthorized access to a computer system. It then argues that the approaches currently used for attribution and response are becoming increasingly unsatisfactory as cyberspace becomes a viable vector for attacks of whatever type. We must, therefore, either (a) modify the existing, general approach we use for real-world threat attribution and response so it also encompasses cyberthreats or (b) develop a supplementary, specialized approach for cyberthreat attribution and response.

Keywords:   cyberattacks, attack attribution, Bureau of Industry and Security, response

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .