challenges to attribution
The case surrounding the events in Estonia (2007) have significant implications for cyber issues. What were the challenges to attribution with the Estonia Case Study? Why is this important to the future of understanding cyber threat situations?