Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Hacking Back: Risks, Challenges, Legalities, and Alternatives for Active Cyber Defense

by Peter Jacobs
December 20, 2018
in Cybersecurity
Reading Time: 3 mins read
A A
hacking Back
Share on FacebookShare on Twitter

The never-ending episodes of data theft and cyber attacks that have been plaguing both private businesses and government agencies seem to be completely one-sided. That is, bad actors attack a company or government agency, and the best that can be done is to try to fend them off or, at least, quickly recover from the incursion.

Hacking back – that is, attempting to identify and attack the entity that just broke through your defenses – seems like the next step for some organizations to take. But it isn’t that simple.

For the Government Technology Insider Podcast, we spoke with Malcolm Harkins, Chief Security and Trust Officer at Cylance to take a hard look at the realities, risks and consequences (unintended or otherwise) of hacking back. He also brought up some ways that CISOs can take a more active stance to protect their networks.

It’s important to note that, while some government agencies may have the legal authority to initiate or respond to a cyber-attack from an outside party, it is currently illegal for private companies or individuals to do so. For legal advice, please contact the appropriate counsel.

Harkins explained that it’s harder to hack back than people may think. Identifying who perpetrated the attack is extremely difficult. He also noted that, in some cases, the threat actors took over devices or networks which were then used to attack yet another party. Citing the DDoS attack against Domain Name System provider Dyn in 2016, he pointed out that in this case, the “machines that are attacking you might actually also be a victim.” Without definitive attribution, you simply can’t be sure if you’d be retaliating against the correct entity.

Harkins says it might be acceptable, if laws are changed to allow it, for ISPs and network service providers to bounce an attacker off the network, but this would only be in narrowly defined situations with much oversight. For the most part, hacking back is – and should be – the domain of law enforcement, the intelligence community and the military.

So, what can organizations do to take a more active role in cyber defense? Harkins agrees that honey pots, mazes and other methods to control their access and learn, understand and disrupt their activities are good ideas. Data beacons could also be effective, to keep track of where your data has gone if it has been stolen and to provide information to share with law enforcement.

But, he explains, it comes down to CIOs and CISOs understanding their vulnerabilities and focus on driving the creation of technologies and procedures to mitigate them. That, he states, would make a “better bend in the curve of risk than cyber weaponization” – preventing an “arms race” that could have dire consequences.

Listen to the podcast here:

https://governmenttechnologyinsider.com/wp-content/uploads/2018/12/GTI-Podcast-M-Harkins-Hacking-Back.mp3
Tags: cyber attacksCybersecurity podcastCylanceDDoS AttackDNS attackDyn attackFederal government cyber strategiesHacking BackMalcolm Harkins

RELATED POSTS

Strategies and Methods
Civilian

Strategies and Methods for Prioritizing Zero Trust Architecture Implementations, Part 2

February 24, 2022
Cybersecurity Strategies
Civilian

Cybersecurity Strategies Need to Evolve: A Guide for Federal Agencies Navigating Zero Trust, Part 1

February 23, 2022
cybersecurity
Cybersecurity

3 Focus Areas to Defend the Mission with Automated Cybersecurity Tools

October 13, 2020

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9396 shares
    Share 3758 Tweet 2349
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    18 shares
    Share 7 Tweet 5
  • Why the Government Needs a Cloud-Native Workforce

    9 shares
    Share 4 Tweet 2
  • The Five Pillars of Zero Trust Architecture

    434 shares
    Share 174 Tweet 109

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us