Cyber Law and Espionage Law As Communicating Vessels

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Law and Espionage Law As Communicating Vessels Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström, (Eds.) 2018 © NATO CCD COE Publications NATO CCD COE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily reflect the policy or the opinion of NATO Phone: +372 717 6800 CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication. Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu Cover design: AKU NATO COOPERATIVE CYBER DEFENCE CENTRE OF ExcELLENCE The NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) is a NATO- accredited cyber defence hub focusing on research, training and exercises. It represents a community of currently 21 nations providing a 360-degree look at cyber defence, with expertise in the areas of technology, strategy, operations and law. The heart of the Centre is a diverse group of international experts from military, government and industry backgrounds. The CCD COE is home to the Tallinn Manual 2.0, the most comprehensive guide on how International Law applies to cyber operations. The Centre also organises the world’s largest and most complex international live-fire cyber defence exercise, Locked Shields. Another highlight of the Centre is the International Conference on Cyber Conflict, CyCon, a unique event joining key experts and decision-makers of the global cyber defence community in Tallinn every spring. As of January 2018 CCD COE is responsible for identifying and coordinating education and training solutions in the field of cyber defence operations for all NATO bodies across the Alliance. The Centre is staffed and financed by its member nations - Austria, Belgium, the Czech Republic, Estonia, Finland, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Portugal, Slovakia, Spain, Sweden, Turkey, the United Kingdom and the United States. NATO-accredited centres of excellence are not part of the NATO Command Structure. CYCON 2018 SPONSORS TABLE OF CONTENTS Introduction 1 Rethinking the Data Wheel: Automating Open-Access, 9 Public Data on Cyber Conflict Christopher Whyte, Brandon Valeriano, Benjamin Jensen, Ryan Maness The Cyber Deterrence Problem 31 Aaron F. Brantly Offensive Cyber Capabilities: To What Ends? 55 Max Smeets, Herbert S. Lin Understanding and Countering Cyber Coercion 73 Quentin E. Hodgson Targeting Technology: Mapping Military 89 Offensive Network Operations Daniel Moore Drawing Inferences from Cyber Espionage 109 Martin C. Libicki The Topography of Cyberspace and 123 Its Consequences for Operations Brad Bigelow Net Neutrality in the Context of Cyber Warfare 139 Kim Hartmann, Keir Giles The Cyber Decade: Cyber Defence at a X-ing Point 159 Robert Koch, Mario Golling Aladdin’s Lamp: The Theft and 187 Re-weaponization of Malicious Code Kārlis Podiņš, Kenneth Geers Cyber Law and Espionage Law as Communicating Vessels 203 Asaf Lubin Internet Intermediaries and Counter-Terrorism: 227 Between Self-Regulation and Outsourcing Law Enforcement Krisztina Huszti-Orban From Grey Zone to Customary International Law: 245 How Adopting the Precautionary Principle May Help Crystallize the Due Diligence Principle in Cyberspace Peter Z. Stockburger Pressing Pause: A New Approach for International 263 Cybersecurity Norm Development Cedric Sabbah Developing Collaborative and Cohesive 283 Cybersecurity Legal Principles Jeff Kosseff Utilizing Air Traffic Communications for OSINT on 299 State and Government Aircraft Martin Strohmeier, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic FeedRank: A Tamper-resistant Method for the Ranking 321 of Cyber Threat Intelligence Feeds Roland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders, Laurent Vanbever HTTP Security Headers Analysis of Top One Million Websites 345 Artūrs Lavrenovs, F. Jesús Rubio Melón On the Effectiveness of Machine and 371 Deep Learning for Cyber Security Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, Mirco Marchetti Screen Watermarking for Data Theft 391 Investigation and Attribution David Gugelmann, David Sommer, Vincent Lenders, Markus Happe, Laurent Vanbever Neural Network and Blockchain Based Technique 409 for Cyber Threat Intelligence and Situational Awareness Roman Graf, Ross King Mission-Focused Cyber Situational 427 Understanding via Graph Analytics Steven Noel, Paul D. Rowe, Stephen Purdy, Michael Limiero, Travis Lu, Will Mathews Biographies 449 INTRODUCTION CyCon X is the tenth iteration of the annual International Conference on Cyber Conflict, organised by the NATO Cooperative Cyber Defence Centre of Excellence and taking place in Tallinn from 29 May to 1 June 2018. Over the years, CyCon has become a world-recognised conference addressing cyber conflict and security from the perspectives of technology, strategy, operations, law, and policy. We are always glad to see our friends in Tallinn again – a number of them have been involved with CyCon since its origins a decade ago – and we also welcome newcomers, who can discover the cyber debates and ‘white night’ walks in Tallinn’s Old Town. We are proud to offer them all the opportunity to meet and learn something new from each other. If CyCon has been able to contribute to interdisciplinary understanding of cyber conflict and security throughout the years, then it has achieved its main goal. CyCon X’s core topic is ‘Maximising Effects’. Since the very beginning, cyberspace has provided unparalleled opportunities to achieve effects in new and novel ways. Today, cyberspace provides a technological platform and an environment for diverse actors, with both good and bad motivations, to influence everyone and everything. Maximising effects in the cyber realm is important for business, media, governments and military, and even private users. However, how will this be achieved and what will the consequences be? How will AI, machine learning and big data help to maximise effects in cyberspace? How will international law develop in light of the serious effects of state-sponsored operations that may or may not be hard to attribute? The effects generated through cyberspace, including new instabilities and vulnerabilities, will require new policies, legal frameworks and technological solutions to maximise security. In response to the Call for Papers in June 2017, almost 200 abstracts were submitted in October. After a careful selection and peer review by the Academic Review Committee, this book contains 22 articles whose authors were invited to present at the conference. Christopher Whyte, Brandon Valeriano, Benjamin Jensen, and Ryan Maness describe the prospects for open-source, public data collection for cyber security events and present an initial data collection and analysis of interstate cyber conflict incidents involving the United States. Aaron F. Brantly examines the applicability of deterrence in the digital age and for digital tools, based on examples from both within and beyond cyberspace. Max Smeets and Herbert S. Lin aim to explain if (and how) offensive cyber capabilities have the potential to change the role of
Recommended publications
  • News, Information, Rumors, Opinions, Etc
    http://www.physics.miami.edu/~chris/srchmrk_nws.html ● Miami-Dade/Broward/Palm Beach News ❍ Miami Herald Online Sun Sentinel Palm Beach Post ❍ Miami ABC, Ch 10 Miami NBC, Ch 6 ❍ Miami CBS, Ch 4 Miami Fox, WSVN Ch 7 ● Local Government, Schools, Universities, Culture ❍ Miami Dade County Government ❍ Village of Pinecrest ❍ Miami Dade County Public Schools ❍ ❍ University of Miami UM Arts & Sciences ❍ e-Veritas Univ of Miami Faculty and Staff "news" ❍ The Hurricane online University of Miami Student Newspaper ❍ Tropic Culture Miami ❍ Culture Shock Miami ● Local Traffic ❍ Traffic Conditions in Miami from SmartTraveler. ❍ Traffic Conditions in Florida from FHP. ❍ Traffic Conditions in Miami from MSN Autos. ❍ Yahoo Traffic for Miami. ❍ Road/Highway Construction in Florida from Florida DOT. ❍ WSVN's (Fox, local Channel 7) live Traffic conditions in Miami via RealPlayer. News, Information, Rumors, Opinions, Etc. ● Science News ❍ EurekAlert! ❍ New York Times Science/Health ❍ BBC Science/Technology ❍ Popular Science ❍ Space.com ❍ CNN Space ❍ ABC News Science/Technology ❍ CBS News Sci/Tech ❍ LA Times Science ❍ Scientific American ❍ Science News ❍ MIT Technology Review ❍ New Scientist ❍ Physorg.com ❍ PhysicsToday.org ❍ Sky and Telescope News ❍ ENN - Environmental News Network ● Technology/Computer News/Rumors/Opinions ❍ Google Tech/Sci News or Yahoo Tech News or Google Top Stories ❍ ArsTechnica Wired ❍ SlashDot Digg DoggDot.us ❍ reddit digglicious.com Technorati ❍ del.ic.ious furl.net ❍ New York Times Technology San Jose Mercury News Technology Washington
    [Show full text]
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Getting to Yes with China in Cyberspace
    Getting to Yes with China in Cyberspace Scott Warren Harold, Martin C. Libicki, Astrid Stuth Cevallos C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr1335 Library of Congress Cataloging-in-Publication Data ISBN: 978-0-8330-9249-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark Cover Image: US President Barack Obama (R) checks hands with Chinese president Xi Jinping after a press conference in the Rose Garden of the White House September 25, 2015 in Washington, DC. President Obama is welcoming President Jinping during a state arrival ceremony. Photo by Olivier Douliery/ABACA (Sipa via AP Images). Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Ashley Deeks*
    ARTICLE An International Legal Framework for Surveillance ASHLEY DEEKS* Edward Snowden’s leaks laid bare the scope and breadth of the electronic surveillance that the U.S. National Security Agency and its foreign counterparts conduct. Suddenly, foreign surveillance is understood as personal and pervasive, capturing the communications not only of foreign leaders but also of private citizens. Yet to the chagrin of many state leaders, academics, and foreign citizens, international law has had little to say about foreign surveillance. Until recently, no court, treaty body, or government had suggested that international law, including basic privacy protections in human rights treaties, applied to purely foreign intelligence collection. This is now changing: Several UN bodies, judicial tribunals, U.S. corporations, and individuals subject to foreign surveillance are pressuring states to bring that surveillance under tighter legal control. This Article tackles three key, interrelated puzzles associated with this sudden transformation. First, it explores why international law has had so little to say about how, when, and where governments may spy on other states’ nationals. Second, it draws on international relations theory to argue that the development of new international norms regarding surveillance is both likely and essential. Third, it identifies six process-driven norms that states can and should adopt to ensure meaningful privacy restrictions on international surveillance without unduly harming their legitimate national security interests. These norms, which include limits on the use of collected data, periodic reviews of surveillance authorizations, and active oversight by neutral bodies, will increase the transparency, accountability, and legitimacy of foreign surveillance. This procedural approach challenges the limited emerging scholarship on surveillance, which urges states to apply existing — but vague and contested — substantive human rights norms to complicated, clandestine practices.
    [Show full text]
  • PWTORCH NEWSLETTER • PAGE 2 Www
    ISSUE #1255 - MAY 26, 2012 TOP FIVE STORIES OF THE WEEK PPV ROUNDTABLE (1) Raw expanding to three hours on July 23 (2) Impact going live every week this summer (3) Flair parting ways with TNA, WWE bound WWE OVER THE LIMIT (4) Raw going “interactive” with weekly voting Staff Scores & Reviews (5) Laurinaitis pins Cena after Show turns heel Pat McNeill, columnist (6.5): The main problem with WWE Over The Limit? The main event went over the limit of what we’ll accept from WWE. You can argue that there was no reason to book John Cena against John Laurinaitis on a pay-per-view, and you’d be right. RawHEA eDLxINpE AaNnALYdSsIS to thrhoeurse, a nhd uosuaullyr tsher e’Js eunoulgyh re2de3eming But on top of that, there was no reason to book content to make it worth the investment. But Cena versus Laurinaitis to go as long as any other three hours? Three hours of lousy content is By Wade Keller, editor major pay-per-view match. And there was no enough that next time viewers might just tune in reason for Cena to drag the match out. It didn’t fit If you follow an industry long enough, you’re for a just an hour instead of the usual two and the storyline. And it made John Cena look like a bound to see some bad decisions being made. certainly not commit to all three. Or they might chump. or like The Stinger, when Big Show turned Some are worse than others, but it’s rare when pick their segments, watching the predictably heel for the umpteenth time and cost him the you think you might be seeing the Worst newsmaking segments at the start of each hour match.
    [Show full text]
  • What Killed Australian Cinema & Why Is the Bloody Corpse Still Moving?
    What Killed Australian Cinema & Why is the Bloody Corpse Still Moving? A Thesis Submitted By Jacob Zvi for the Degree of Doctor of Philosophy at the Faculty of Health, Arts & Design, Swinburne University of Technology, Melbourne © Jacob Zvi 2019 Swinburne University of Technology All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. II Abstract In 2004, annual Australian viewership of Australian cinema, regularly averaging below 5%, reached an all-time low of 1.3%. Considering Australia ranks among the top nations in both screens and cinema attendance per capita, and that Australians’ biggest cultural consumption is screen products and multi-media equipment, suggests that Australians love cinema, but refrain from watching their own. Why? During its golden period, 1970-1988, Australian cinema was operating under combined private and government investment, and responsible for critical and commercial successes. However, over the past thirty years, 1988-2018, due to the detrimental role of government film agencies played in binding Australian cinema to government funding, Australian films are perceived as under-developed, low budget, and depressing. Out of hundreds of films produced, and investment of billions of dollars, only a dozen managed to recoup their budget. The thesis demonstrates how ‘Australian national cinema’ discourse helped funding bodies consolidate their power. Australian filmmaking is defined by three ongoing and unresolved frictions: one external and two internal. Friction I debates Australian cinema vs. Australian audience, rejecting Australian cinema’s output, resulting in Frictions II and III, which respectively debate two industry questions: what content is produced? arthouse vs.
    [Show full text]
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
    [Show full text]
  • The Formation of Subjectivity in Mexican American Life Narratives
    University of New Mexico UNM Digital Repository American Studies ETDs Electronic Theses and Dissertations 2-9-2011 Ghostly I(s)/Eyes: The orF mation of Subjectivity in Mexican American Life Narratives Patricia Marie Perea Follow this and additional works at: https://digitalrepository.unm.edu/amst_etds Recommended Citation Perea, Patricia Marie. "Ghostly I(s)/Eyes: The orF mation of Subjectivity in Mexican American Life Narratives." (2011). https://digitalrepository.unm.edu/amst_etds/34 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at UNM Digital Repository. It has been accepted for inclusion in American Studies ETDs by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. i ii © 2010, Patricia Marie Perea iii DEDICATION por mi familia The smell of cedar can break the feed yard. Some days I smell nothing until she opens her chest. Her polished nails click against tarnished metal Cleek! Then the creek of the hinge and the memories open, naked and total. There. A satin ribbon curled around a ringlet of baby fine hair. And there. A red and white tassel, its threads thick and tangled. Look here. She picks up a newspaper clipping, irons out the wrinkles between her hands. I kept this. We remember this. It is ours. iv ACKNOWLEDGMENTS Until quite recently, I did not know how many years ago this dissertation began. It did not begin with my first day in the Ph.D. program at the University of New Mexico in 2000. Nor did it begin with my first day as a graduate student at the University of Texas at Austin in 1997.
    [Show full text]
  • Twodee's Shadowrun Storytime, Including but Not Limited to the Full Chapter 15 and Chapters 21 and 21.5
    1 TwoDee’s Shadowrun Storytime Written by TwoDee Edited and Compiled by Jarboot!!j4xjG8Gxyo4 Further Edited and Compiled by Impatient Asshole Anon What follows is arguably the best series of storytime threads ever created. If you're any sort of fan of Shadowrun—whether you're a new GM, newbie player, or even a veteran—this prose will really help flesh out what sort of fun you can have with the system and setting. It's nearly 400 pages and about 130,000 words, so download this to read on your phone/laptop/ebook/commlink, because this will take a while. I'm Jarboot, a fellow fa/tg/uy and Shadowrun fan. Someone suggested that someone make a compilation of this story for easier reading, so I figured I could do it. Editing is minimal, but I fixed a lot of spelling and general syntax error, most of which were mentioned by TwoDee in a post following the original. There are some little Jackpoint-esque comments from other people from the threads included in the document, which are differentiated by a green color and indented text. I may have included a picture or two in there, too. Also, 2D likes to do some foreshadowing at some points, so keep track of the greentexted dates if you feel confused. All these threads (except number 3, which you can search for using some of the other tags) can be found by searching for the “shadowrun storytime” tag on the /tg/ archive. Jarboot is an extremely helpful fa/tg/uy, but this particular Anon is an impatient asshole who wanted a fully updated version of TwoDee's Shadowrun Storytime, including but not limited to the full Chapter 15 and Chapters 21 and 21.5.
    [Show full text]
  • Vital Web Stats—And More
    Vital Web Stats—And More You have been invited to share your opinions My Account | Sign In Not a member? Join now What do savvy IT buyers think about the leading IT products? Can you help eWEEK find out? Home > ReviewsJust > Vitalclick WebOK toStats—And begin the More survey! VitalAnd, by Web the way, Stats—And there's a chance to Morewin some cool tech TABLE OF CONTENTS gadgets at its end. • Introduction By Jim Rapoza • WebTrends Reporting August 26, 2002 Center 5.0 Be the first to comment on • Sitecatalyst 8.0 this article • Executive Summary: WebTrends Reporting How many hits are we getting? Which are the most popular pages on Center 5.0 our site? Where are visitors coming from? • Executive Summary: Sitecatalyst 8.0 These are the most common questions Web site administrators have on a daily basis about their site. But when it comes down to improving the TOPIC CENTERS site for visitors, knowing how your site is really used and getting rid of Content Creation waste in the site, a lot more information is necessary. Database Desktops & Notebooks There are many technologies for analyzing and reporting on the Enterprise Apps massive amount of information generated by busy Web sites. These Infrastructure range from traditional log file analyzers to network sniffers to agents Linux & Open Source installed on the Web server to services that receive information Macintosh whenever a page is accessed. Messaging/Collaboration Mobile & Wireless Search Most small sites can get by with simple tools that answer only the most Security basic questions. However, large content and e-commerce sites, as well Storage as those in large enterprises, require applications that can provide More Topics > detailed, flexible analysis capabilities.
    [Show full text]
  • 10Th International Conference on Cyber Conflict Cycon X: Maximising Effects
    2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström, (Eds.) 2018 © NATO CCD COE Publications NATO CCD COE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily reflect the policy or the opinion of NATO Phone: +372 717 6800 CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication.
    [Show full text]