Why is the definitive attribution of cyber attacks and exploitation difficult, according to Lin?
a. Cyber activities leave no traces.
b. Nonstate actors are hard to identify.
c. Cyber attackers want to remain anonymous.
d. Offensive cyber operations may not take place within the entity sponsoring it.
d
Political Science
You might also like to view...
When Kenya first became self-governing in 1963 its head of state was:
A. the Queen B. the President C. the Prime Minister D. the King
Political Science
The new Senate of the Kenyan legislature will be based upon representation for:
A. ethnic groups B. genders C. counties D. religious groups
Political Science