Attack Characterization Techniques
Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him.
Professor Edmond Locard
You’ve dedicated a significant amount of your valuable time reading about advanced, persistent, and advanced persistent threats before arriving at this chapter. The study of the legal and threat landscape, as well as the various TTPs employed by those who wish you harm, is very important. However, what does it all mean? What happened? When did this all start? Where did they get in, and where did they go? Why did they attack you?
At the core of this discussion ...

Get Reverse Deception: Organized Cyber Threat Counter-Exploitation now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.