Active Response to Computer Intrusions
David Dittrich, University of Washington
Kenneth Einar Himma, Seattle Pacific University
Introduction: The Concept of Active Response
Potential Technical Barriers for Intrusion Response
Volatility of Digital Information
Understanding Attack Methodology
Involving Law Enforcement Agencies
Levels of Force: Benign Through Aggressive Responses
An Evidentiary Restriction for Justifiably Acting under Ethical Principles
Evaluating Active Response under the Relevant Ethical Principles
The Inadequacy of Law Enforcement Efforts
The Legality of Active Response
Legal Analogues of the Defense and Necessity Principles
INTRODUCTION: THE CONCEPT OF ACTIVE RESPONSE
The active response continuum defines a category of digital response to unauthorized digital intrusions1 and hence falls within a wide spectrum of potential responses by private entities.2 At one end of the spectrum is the wholly passive, unknowing victim who relies entirely on just the inherent capabilities of the software that comes with the computer he or she purchased and who does not know when it is being attacked. At the other is the active, fully engaged victim ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.