page 31-32

Page 1

I

t’s a controversial idea, and the law

generally frowns on cyber attacks in general, but at the Black Hat DC conference, some speakers took up the issue of whether and how organizations should counterattack against adversaries clearly using attack tools to break into and subvert corporate data security. One idea that got plenty of attention was the notion of exploiting vulnerabilities in attack tools and botnets to try to determine what the attacker was going after or feed fake data, or even dive into the attacker’s network lair. If it turns out an attacker has taken control of a corporate machine, it’s logi-

Should revenge assaults be just another security tool large IT shops use to counter cyber attacks and data security subversion? By Ellen Messmer february 2011

Feature.indd 31

INDIAN Channelworld

31

2/15/2011 10:51:28 AM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.