1. Problem Section
2. For a discussion of the attribution challenges specific to different types of cyber-attacks, including Internet-based attacks, non-Internet cyber-attacks, and threats of malicious code inserted into supply chains, see Untangling Attribution: Moving to Accountability in Cyberspace, Planning for the Future of Cyber Attack: Hearing Before the H;Subcomm. on Tech. and Innovation of the H. Comm. on Sci. and Tech,2010
3. Normative competition in cyberspace