PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
February 2004

Cyberspace security liability lawsuits on the rise?

You've seen it often enough. Some hacker creates an army of zombies to launch a DDoS attack against a high-profile corporate target. Maybe he hijacks your networks as a platform for his attack. In addition to being an unwitting accomplice, you're hit with something brand new -- a liability suit by the company devastated by the attack. "Why me?" you ask. Going after the original attacker -- if you can catch him -- seems to be the obvious course of action, but it's unlikely that a script-kiddie living in his parents' basement will have much liquidity. Stricken companies are going to follow the money to recoup their losses. Legal experts think it's only a matter of time before hacker victims start suing the owners of systems and networks used as launchpads in attacks. Their clients are asking now how they can strengthen their security posture against such suits. Infosecurity's first downstream liability lawsuit, experts say, will likely be born from catastrophe. For example, an online retailer will be hit by a devastating DoS ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • SOX section 404: Improving security with executive communications

    by  Edward Hurley

    It's widely held that the Sarbanes-Oxley Act will be the two-by-four that gets upper management to pay serious attention to infosecurity. Here you will learn how SOX section 404 plays a hand in improving seucrity with executive communications.

  • Best practices for security report writing

    by  Robert Garigue and Marc Stefaniu

    Concise, targeted security reports command the attention of the executives who need to act on them. Learn best practices for security report writing.

Columns in this issue