Jay Healey on being able to delineate between the (likely) actions of a State and those of a non-State actor:
“We see the state fingerprints on this hack” has been a relatively common phrase in news articles over the past months, but what does it really mean?
Computer security professionals use a variety of criteria to decide if they think a nation may be behind any particular malicious cyber incident. Of course, different analysts may use different criteria or weigh evidence differently but there are a few themes that tend to be consistent.
Read about the criteria Jay has chosen here.