Access "Cyberspace security liability lawsuits on the rise?"
This article is part of the February 2004 issue of Closing the gap: How to decide when (and if) to patch vulnerabilities
You've seen it often enough. Some hacker creates an army of zombies to launch a DDoS attack against a high-profile corporate target. Maybe he hijacks your networks as a platform for his attack. In addition to being an unwitting accomplice, you're hit with something brand new -- a liability suit by the company devastated by the attack. "Why me?" you ask. Going after the original attacker -- if you can catch him -- seems to be the obvious course of action, but it's unlikely that a script-kiddie living in his parents' basement will have much liquidity. Stricken companies are going to follow the money to recoup their losses. Legal experts think it's only a matter of time before hacker victims start suing the owners of systems and networks used as launchpads in attacks. Their clients are asking now how they can strengthen their security posture against such suits. Infosecurity's first downstream liability lawsuit, experts say, will likely be born from catastrophe. For example, an online retailer will be hit by a devastating DoS attack that disrupts its business. ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
A Patch in Time: Considering automated patch management
by Pete Lindstrom, Contributor
Vulnerabilities are followed by patches, followed by exploits, followed by misery. Automated patch management solutions ease the pain and cut costs.
-
Cyberspace security liability lawsuits on the rise?
by Edward Hurley
Double jeopardy doesn't apply in cyberspace, and the coming wave of downstream security liability lawsuits could make your organization a victim twice over.
-
Best practices for security report writing
by Robert Garigue and Marc Stefaniu
Concise, targeted security reports command the attention of the executives who need to act on them. Learn best practices for security report writing.
-
A Patch in Time: Considering automated patch management
by Pete Lindstrom, Contributor
-
-
Red-zone defense: Products to prevent IP Leakage
by Kevin Beaver
New technologies to support intellectual property and keep your IP under lock and key.
-
SOX section 404: Improving security with executive communications
by Edward Hurley
It's widely held that the Sarbanes-Oxley Act will be the two-by-four that gets upper management to pay serious attention to infosecurity. Here you will learn how SOX section 404 plays a hand in improving seucrity with executive communications.
-
Red-zone defense: Products to prevent IP Leakage
by Kevin Beaver
-
Columns
-
Editor's desk: The future of 'Information Security' magazine
by Lawrence M. Walsh
Lawrence Walsh explains why the combo of "Information Security" and SearchSecurity.com is the industry's No. 1 trusted infosec resource.
-
React in seconds with a network incident response plan
by Marcus Ranum
A network incident response plan enables the split-second reactions necessary to survive next-generation attacks.
-
OS Hardening and Other Essential Linux Skills for Maintaining Security
by Jay Beale
Jay Beales outlines must-have Linux skills for administrators.
-
The 'antiworm' evolution: Can it help Internet worm protection?
by Pete Lindstrom, Contributor
New "antiworm" or "worm containment" solutions promise new prevention and detection techniques that reduce or eliminate propagating worms. But do they work?
-
Security jargon: Using IT language analogies to explain information security
by Andrew Briney
Information security is a business of nonstop metaphors, cliches, similes and comparisons. Should we all agree to put a moratorium on using IT language analogies to describe what we do?
-
Editor's desk: The future of 'Information Security' magazine
by Lawrence M. Walsh
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO