SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

A Critique of Active Defense or ‘Hack Back’

1 min read
in Document, Paper

Abstract

Beyond the context of “ethical hacking” where network attacks are conducted with the explicit permission of the network owner, such as during a penetration test, “hacking” typically violates state and federal laws. An emergent perspective that a company may take the law into their own hands and fight fire with fire termed ‘hack-back’ or ‘active defense’ has begun to gain momentum. This is where a corporate entity may engage in attacks which are commensurate with the attack perpetrated. We explore the emergent area of ‘active defense’ or ‘hack back strategy’ where, in response to persistent and potentially damaging hack attempts upon an entity, an active defense model is considered. We outline the cyberdefense team and what this might mean from an active defense perspective

GET DOCUMENT

Related

Tags: Active DefenseActive Defense DocumentsPaper
7
VIEWS
ADVERTISEMENT

Related Posts

Payment Card Industry (PCI) Qualified Security Assessors

Payment Card Industry (PCI) Qualified Security Assessors

May 18, 2022
Payment Card Industry (PCI) Data Security Standard Final PFI Report

Payment Card Industry (PCI) Data Security Standard Final PFI Report

May 18, 2022
Payment Card Industry (PCI) Data Security Standard PFI Preliminary Incident Response Report

Payment Card Industry (PCI) Data Security Standard PFI Preliminary Incident Response Report

May 18, 2022
PCI Firewall Basics

PCI Firewall Basics

May 18, 2022

More Articles

Tool

FortiSIEM – Tools

March 16, 2022
Document

TOP 10 Critical Infrastructure and SCADA/ICS Cybersecurity Vulnerabilities and Threats

March 10, 2022
Movie

Who Am I (2014 film)

January 29, 2021

Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense

January 12, 2022
Document

Detecting Abuse of Authentication Mechanisms

January 21, 2022
Definition

Email spoofing

December 19, 2020
Certification

Certified Hacking Forensic Investigator (CHFI)

April 19, 2022
Quotes

“If you are responsible for testing…”

April 20, 2021
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....