Attack Characterization Techniques
Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him.
Professor Edmond Locard
You’ve dedicated a significant amount of your valuable time reading about advanced, persistent, and advanced persistent threats before arriving at this chapter. The study of the legal and threat landscape, as well as the various TTPs employed by those who wish you harm, is very important. However, what does it all mean? What happened? When did this all start? Where did they get in, and where did they go? Why did they attack you?
At the core of this discussion ...

Get Reverse Deception: Organized Cyber Threat Counter-Exploitation now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.