SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Active Defense: An Overview of the Debate and a Way Forward

1 min read
in Document, Paper

Abstract

As the information economy expands, network security threats proliferate. Large-scale data breaches have become something of a fixture in today’s news cycle: Target, Sony, Home Depot, JPMorgan Chase—the list goes on. Some estimates place the global costs of cyber insecurity at more than $400 billion. The United States is at something of a crossroads on one particularly crucial security issue: active defense. Sometimes called hacking back or counterhacking, the practice of confusing, identifying, and even incapacitating an attacker is increasingly catching the attention of security professionals and policymakers. This paper seeks to synthesize the available legal resources on active defense. It confronts the intertwined definitional, legal, and policy questions implicated in the active defense debate. The paper then proposes a legal framework to authorize active defenses subject to liability for third-party damages, an approach grounded in the technical and economic realities of the network security market.

GET DOCUMENT

Related

Tags: Active DefenseActive Defense DocumentsPaper
5
VIEWS
ADVERTISEMENT

Related Posts

Software Quality Assurance

Software Quality Assurance

June 24, 2022
7 tips to improve your QA

7 tips to improve your QA

June 24, 2022
World Quality Report 2021 22

World Quality Report 2021 22

June 24, 2022
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

June 24, 2022

More Articles

Incidents

Pegasus mobile spyware snoop on Catalan politicians

April 19, 2022
Incidents

Thousands of Borrowers’ Data Exposed from ENCollect

May 5, 2022

Black Box

October 13, 2020
Alerts

CISA Releases Security Advisory for Geutebruck Devices

July 27, 2021

Vectra’s Cognito

March 19, 2021
Book

SOC for Supply Chain: Reporting on an Examination of Controls Relevant

April 8, 2022
CyberStory

CyberStory: Teenagers

May 20, 2022
Certification

AWS Certified DevOps Engineer

January 26, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....