1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

A gentler way to hack back

Discussion in 'CSO' started by RSS, Aug 8, 2016.

  1. RSS

    RSS New Member Member

    The quickest way to launch the cyber equivalent of a nuclear war is for the targets of cyberattacks to try to “hack back” against their tormentors.

    Or, maybe not.

    The debate over that has raged for decades, with a majority of security experts arguing that the difficulties of attribution and the dangers of escalating retaliatory counterattacks make hacking back a losing proposition.

    But what if it didn’t involve trying to corrupt or destroy an attacker’s network? What if it wasn’t exactly “kinder,” but was a bit “gentler,” involving intermediate-level responses like so-called “naming and shaming” of perpetrators, or blocking access to U.S. markets of foreign companies that benefit from cyber espionage?

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page