Some of my clients have engaged me in the past year to help them with internet & PC security. From drafting policies & assessing risk through to evaluating software & creating cost-benefit analysis I've seen a lot on this subject in the past year. Layer on the new privacy legislation that came into effect this year in Canada and it can all get pretty complex on what a company can and can't do to protect itself from internal & external security risks.
That's why this recent article from the Globe & Mail titled Vigilante Justice Comes to Cyberspace rather intrigued me. I read it a couple of days ago and I have found myself thinking about it off and on trying to formulate an opinion. The article is about a solution from a company called Symbiot Security Inc. and they have developed the Intelligent Security Infrastructure Management Systems that not only defends networks but will also mount an attack on the attacker. Now while this may give you that sense of being Charles Bronson out to teach the bad guys a lesson, it does raise a very interesting situation.
Though the notion of striking back against "bad guys" may satisfy primal urges, most security experts question whether retaliation will actually halt cyber attacks. Instead the skeptics worry that fighting back could trigger lawsuits, Internet traffic jams and more digital onslaughts.
What happens when the software, say installed at some Fortune 500 company, strikes back at an attack that might be coming unknowingly, from another company? What if in defending and attacking an attacker, the Intelligent Security Infrastructure Management Systems encounters itself out in cyberspace? What about when
the "attacker" could be thousands of computers whose users have no idea their machine is infected with a virus.
I would think that hackers & network attackers would actually try and exploit this technology to further clog the Internet. So on the surface it would seem that this would be a disastrous step in the area of network security due to its potential to cause widespread problems on the net.
For those of you who have been dealing with network security, either from a legal, technical or business perspective, I would welcome your comments on this subject.
Recent Comments