The IT Law Wiki
 
(5 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
{{Quote|[is a] piece of [[evidence]] (e.g., an old [[digital certificate]]) planted by [[hacker]]s to deliberately mislead investigators about their [[identity]].}}
 
{{Quote|[is a] piece of [[evidence]] (e.g., an old [[digital certificate]]) planted by [[hacker]]s to deliberately mislead investigators about their [[identity]].}}
   
 
{{Quote|[a] term with naval origins and is used to describe a situation when in times of war, ships would sometimes change the national flag they flew in order to fool other ships. The term can be applied to [[cyber attack]]s with a [[nation state]] using [[technology]] to hide their [[identity]] behind an [[identity]] that would point to another nation.<ref>[[Counting the Cost: Cyber Exposure Decoded]], at 17 n.f.</ref>}}
{{[a] term with naval origins and is used to describe a situation when in
 
times of war, ships would sometimes change the national flag they flew in order to fool other ships. The term can be applied to [[cyber attack]]s with a [[nation state]] using [[technology]] to hide their [[identity]] behind an [[identity]] that would point to another nation.<ref>[[Counting the Cost, Cyber Exposure Decoded]], at 17 n.f.</ref>}}
 
   
 
== References ==
 
== References ==
Line 13: Line 12:
 
== Source ==
 
== Source ==
   
* Bishop Fox, Cybersecurity Style Guide (Ver. 1.1) (June 17, 2018) ([* Bishop Fox, Cybersecurity Style Guide (Ver. 1.1) (June 17, 2018) ([https://www.bishopfox.com/files/brochures/2018/Bishop%20Fox%20-%20Cybersecurity%20Style%20Guide%20-%20V1.1.pdf full-text]).
+
* Bishop Fox, Cybersecurity Style Guide (Ver. 1.1) (June 17, 2018) ([https://www.bishopfox.com/files/brochures/2018/Bishop%20Fox%20-%20Cybersecurity%20Style%20Guide%20-%20V1.1.pdf full-text]).
 
[[Category:Definition]]
 
[[Category:Definition]]
 
[[Category:Cybercrime]]
 
[[Category:Cybercrime]]

Latest revision as of 05:03, 28 January 2020

Definitions[]

A false flag

[is a] piece of evidence (e.g., an old digital certificate) planted by hackers to deliberately mislead investigators about their identity.
[a] term with naval origins and is used to describe a situation when in times of war, ships would sometimes change the national flag they flew in order to fool other ships. The term can be applied to cyber attacks with a nation state using technology to hide their identity behind an identity that would point to another nation.[1]

References[]

Source[]

  • Bishop Fox, Cybersecurity Style Guide (Ver. 1.1) (June 17, 2018) (full-text).