Cybersecurity, A-Z: A is for Active Cyber Defense

(First in a continuing series.)

Active Cyber Defense, or ACD, is a broad category encompassing different kinds of actions that organizations can take to defend against breaches and cyberattacks. The operative word is “active.”  Conventional security against breaches tend to involve anti-virus software, encryption, and other perimeter defenses that act to prevent outsiders from coming in to your organization’s systems.  ACD tools are different, and involve anticipating, planning, proactively executing cyberdefense actions.  Such actions can take on many forms.  Decoys, for example, are fake systems that can stymie would-be attackers. Honeypots are treasure troves of false information that can lure attackers and provide them fake information — including fake credentials — wasting their time or even, in some cases, permitting organizations to identify where attacks are originating. Technology companies offering cybersecurity products are increasingly offering ACD tools.  Such tools, however, can range from the permissible (such as decoys) to the questionable:  hacking back, for example, almost certainly violates the Computer Fraud and Abuse Act (CFAA), with the possible exception of circumstances where organizations are working with law enforcement.  Proposed legislation seeks to change that by amending the CFAA.  Make sure you consult with counsel before determining how aggressive you can be.

 

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Foley Hoag LLP - Security, Privacy and the Law | Attorney Advertising

Written by:

Foley Hoag LLP - Security, Privacy and the Law
Contact
more
less

Foley Hoag LLP - Security, Privacy and the Law on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide