A Practical Method of Identifying Cyberattacks

Start adding items to your reading lists:
or
Save this item to:
This item has been saved to your reading list.

The frequency and scope of cyberattacks continue to grow, and yet despite the seriousness of the problem, it remains extremely difficult to differentiate between the various sources of an attack - making the study of the topic more urgent today than ever before. This paper aims to shed light on the main types of cyberattacks and provides examples of each. It presents a high-level framework for investigation aimed at helping analysts gain a better understanding of the origins of threats, the motive of the attacker, the technical origin of the attack, the information contained in the coding of the malware and the attacker’s modus operandi.

Contact us

Simone Vernacchia
Director, Cyber Security
Tel: +966 (0) 50 296 1960
Email

Follow us