First page Back Continue Last page Summary Graphic
War on Cyber Crime
Use I&W techniques to predict behavior
Techniques are used in post-attack research
Post-mortem
- determine attack characteristics
- physical, social engineering, system level
Security Indications and Warnings (SIW)