Why is the definitive attribution of cyber attacks and exploitation difficult, according to Lin?

a. Cyber activities leave no traces.
b. Nonstate actors are hard to identify.
c. Cyber attackers want to remain anonymous.
d. Offensive cyber operations may not take place within the entity sponsoring it.

d

Political Science

You might also like to view...

When Kenya first became self-governing in 1963 its head of state was:

A. the Queen B. the President C. the Prime Minister D. the King

Political Science

The new Senate of the Kenyan legislature will be based upon representation for:

A. ethnic groups B. genders C. counties D. religious groups

Political Science