Hacking back or strikeback technologies is a system engineering term that could occur in a situation with a positive loop, whereby each component responds with an increased reaction to the response of the other component, and so the problem gets worse and worse. (The Information Security Dictionary: Defining the Terms That Define Security, by Urs E. Gattiker) Recently, a honey pot was created with some strikeback technology in the code. In this episode of MSI Strategy & Tactics, Brent Huston and the techs discuss the various aspects of this technology and how it would affect you. Discussion questions include:
- What is the history of strike back, hacking back and how does it apply to today when you have major teams working to take down bot nets and such?
- HoneyPoint has a type of technology called “defensive fuzzing” which does something that has been compared to strikeback. How it is different than other technologies?
- What is the current take on the legality of strikeback/hacking back? Are organizations being put at risk if they attack their attackers or if their security teams go on offense?
Panelists:
Brent Huston, CEO and Security Evangelist
Adam Hostetler, Network Engineer, Security Analyst
Phil Grimes, Security Analyst
John Davis, Risk Management Engineer
Mary Rose Maguire, Marketing Communication Specialist and moderator
Click the embedded player to listen. Or click this link to access downloads. Stay safe!
MSI Strategy & Tactics Talk Ep. 26: Hacking Back or Strikeback Technologies:
FB.Event.subscribe(‘edge.crea… http://t.co/pYvwqYuI
MSI Strategy & Tactics Talk Ep. 26: Hacking Back or Strikeback Technologies – http://t.co/xLeQHDHj