m (→Definitions) |
m (→Source) |
||
(5 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
{{Quote|[is a] piece of [[evidence]] (e.g., an old [[digital certificate]]) planted by [[hacker]]s to deliberately mislead investigators about their [[identity]].}} |
{{Quote|[is a] piece of [[evidence]] (e.g., an old [[digital certificate]]) planted by [[hacker]]s to deliberately mislead investigators about their [[identity]].}} |
||
⚫ | {{Quote|[a] term with naval origins and is used to describe a situation when in times of war, ships would sometimes change the national flag they flew in order to fool other ships. The term can be applied to [[cyber attack]]s with a [[nation state]] using [[technology]] to hide their [[identity]] behind an [[identity]] that would point to another nation.<ref>[[Counting the Cost: Cyber Exposure Decoded]], at 17 n.f.</ref>}} |
||
− | {{[a] term with naval origins and is used to describe a situation when in |
||
⚫ | times of war, ships would sometimes change the national flag they flew in order to fool other ships. The term can be applied to [[cyber attack]]s with a [[nation state]] using [[technology]] to hide their [[identity]] behind an [[identity]] that would point to another nation.<ref>[[Counting the Cost |
||
== References == |
== References == |
||
Line 13: | Line 12: | ||
== Source == |
== Source == |
||
− | + | * Bishop Fox, Cybersecurity Style Guide (Ver. 1.1) (June 17, 2018) ([https://www.bishopfox.com/files/brochures/2018/Bishop%20Fox%20-%20Cybersecurity%20Style%20Guide%20-%20V1.1.pdf full-text]). |
|
[[Category:Definition]] |
[[Category:Definition]] |
||
[[Category:Cybercrime]] |
[[Category:Cybercrime]] |
Latest revision as of 05:03, 28 January 2020
Definitions[]
A false flag
“ | [is a] piece of evidence (e.g., an old digital certificate) planted by hackers to deliberately mislead investigators about their identity. | ” |
“ | [a] term with naval origins and is used to describe a situation when in times of war, ships would sometimes change the national flag they flew in order to fool other ships. The term can be applied to cyber attacks with a nation state using technology to hide their identity behind an identity that would point to another nation.[1] | ” |
References[]
- ↑ Counting the Cost: Cyber Exposure Decoded, at 17 n.f.
Source[]
- Bishop Fox, Cybersecurity Style Guide (Ver. 1.1) (June 17, 2018) (full-text).