Question 10 of 10Pro Only
Discuss the challenges of adversary attribution in cyber threat intelligence. What techniques do analysts use to attribute attacks, what are the common obstacles including false flag operations, and how do geopolitical considerations influence both the production and consumption of threat intelligence?
Sample answer preview
Adversary attribution is one of the most challenging and consequential aspects of cyber threat intelligence. Correctly identifying who is behind an attack influences everything from incident response strategy to organizational risk decisions and, at the national level,…
attributionfalse flagOlympic DestroyerTTPsinfrastructure analysisgeopolitics