Archive | January, 2015

Attribution is Hard, Part 1 | Tenable Network Security

To accurately establish attribution, you need evidence and understanding: Evidence linking the presumed attacker to the attack An understanding of the attacker’s actions, supporting that evidence Evidence collected from other systems that matches the understanding of the attacker’s actions An understanding of the sequence of events during the attack, matching the evidence via Attribution is […]

Powered by WordPress. Designed by Woo Themes