Follow Mark on LinkedIn Follow @marknca on Twitter Follow marknca on YouTube
marknca

Mornings With Mark
no. // 0 0 0 4

Cybersecurity Basics #9 - Attack Attribution

Subscribe to the podcast.

Watch the episode here

Join the discussion on LinkedIn

Tweet about this episode

Full machine generated transcript follows

Morning, everybody. How you doing today? Another episode of mornings with Mark today and everyday is very much appreciated or tackling attack tribution. I'm probably going to be FaceTiming the majority of this episode because this is frustrating point. I hope that I can shed some light on. The subject for U-Haul is figuring out who is behind a specific person or entity be super easy terms to Define where John have a great day.

Course, it's more complicated than that the desire disorder very human nature to find out who who drives the story. So for always wondering people from figuring out the challenges high level of confidence. You're going to see a variety of statements in the investigations that refused to say that it was Mork sitting behind a keyboard that lost a specific Cyber attack.

Normally use in a couple analogy for the late. Mrs. When you're dealing with a cyberattack, there's a whole bunch of pieces of strewn across the internet to assemble the puzzle the goal scorer of March information as you can to sit through it in order to get these pieces of a puzzle.

I need to normally find different properties are attributes of an attack, but you won't be able to tie dye a tendency to people unless they make a massive mistake. I haven't even then it's really hard to figure out whether or not a lot easier. So let's use wannacry one has malware outbreak in 2017 in Springs reported to be ransomware just wasn't really effective at it and there's a bunch of systems.

And making sure that you know, each contraction is in fact from The Strain strain or strains. Are you pulled off system systems a through D were attacked by the same campaign or the same as far as I can system, Georgia criminal. Okay, what do we know about that? We know that this is also tax system more pieces of the puzzle.

Does that relate to Mark kind of keyboard typing on the server or infection from me or you need something else? Deep dive investigation into your perspective is it hard to figure out who's behind identity is not useful for most people in law enforcement or nation-state politics is this just sort of a script-kiddie a random drive-by wasn't intentional is not directly related to somebody's trying to make money off of me and I'm just an unintended stormy seas are really all you need to know for sure.

It's interesting who attacks the thyroid problems behind it. There's a lot of work going on from security companies like I work with law enforcement the nation's I was trying to figure out a TV shows when you see movies. They are trying to figure out who it may make it ridiculously easy.

It's extremely hard to figure out who's behind an intact is figuring out the category the Packer that will actually help you take steps to protect yourself. And that's really what this is all about Eve online at Mark MCA supposed to be on the blogs in the comments down below by email me at Mark M.

Cai for everybody including the podcast listeners and I will see you on the show tomorrow. Morning, everybody. How you doing today? Another episode of mornings with Mark today and everyday is very much appreciated or tackling attack tribution. I'm probably going to be FaceTiming the majority of this episode because this is frustrating point.

I hope that I can shed some light on. The subject for U-Haul is figuring out who is behind a specific person or entity be super easy terms to Define where John have a great day. Course, it's more complicated than that the desire disorder very human nature to find out who who drives the story.

So for always wondering people from figuring out the challenges high level of confidence. You're going to see a variety of statements in the investigations that refused to say that it was Mork sitting behind a keyboard that lost a specific Cyber attack. Normally use in a couple analogy for the late.

Mrs. When you're dealing with a cyberattack, there's a whole bunch of pieces of strewn across the internet to assemble the puzzle the goal scorer of March information as you can to sit through it in order to get these pieces of a puzzle. I need to normally find different properties are attributes of an attack, but you won't be able to tie dye a tendency to people unless they make a massive mistake.

I haven't even then it's really hard to figure out whether or not a lot easier. So let's use wannacry one has malware outbreak in 2017 in Springs reported to be ransomware just wasn't really effective at it and there's a bunch of systems. And making sure that you know, each contraction is in fact from The Strain strain or strains.

Are you pulled off system systems a through D were attacked by the same campaign or the same as far as I can system, Georgia criminal. Okay, what do we know about that? We know that this is also tax system more pieces of the puzzle. Does that relate to Mark kind of keyboard typing on the server or infection from me or you need something else? Deep dive investigation into your perspective is it hard to figure out who's behind identity is not useful for most people in law enforcement or nation-state politics is this just sort of a script-kiddie a random drive-by wasn't intentional is not directly related to somebody's trying to make money off of me and I'm just an unintended stormy seas are really all you need to know for sure.

It's interesting who attacks the thyroid problems behind it. There's a lot of work going on from security companies like I work with law enforcement the nation's I was trying to figure out a TV shows when you see movies. They are trying to figure out who it may make it ridiculously easy.

It's extremely hard to figure out who's behind an intact is figuring out the category the Packer that will actually help you take steps to protect yourself. And that's really what this is all about Eve online at Mark MCA supposed to be on the blogs in the comments down below by email me at Mark M.

Cai for everybody including the podcast listeners and I will see you on the show tomorrow.