Detail publikace

Fighting the 'Good' Internet War

Originální název

Fighting the 'Good' Internet War

Anglický název

Fighting the 'Good' Internet War

Jazyk

en

Originální abstrakt

We review the current strategies to counter Internet threats under the light of the classic strategy literature. The literature often advocates proactive action, and dominance of the (virtual, in our case) battlefield, which is the opposite from what we see defenders deploy today. Their actions are instead reactive and exclusively defensive. We propose strategies for defenders to regain the initiative and push security solutions far beyond the reach of current security tools -- yet those strategies start mirroring the actions and technologies of the bad guys, and confront us with important technical, legal and moral dilemmas.

Anglický abstrakt

We review the current strategies to counter Internet threats under the light of the classic strategy literature. The literature often advocates proactive action, and dominance of the (virtual, in our case) battlefield, which is the opposite from what we see defenders deploy today. Their actions are instead reactive and exclusively defensive. We propose strategies for defenders to regain the initiative and push security solutions far beyond the reach of current security tools -- yet those strategies start mirroring the actions and technologies of the bad guys, and confront us with important technical, legal and moral dilemmas.

BibTex


@inproceedings{BUT32583,
  author="Daniel {Cvrček} and George {Danezis}",
  title="Fighting the 'Good' Internet War",
  annote="We review the current strategies to counter Internet threats under the light of
the classic strategy literature. The literature often advocates proactive action,
and dominance of the (virtual, in our case) battlefield, which is the opposite
from what we see defenders deploy today. Their actions are instead reactive and
exclusively defensive. We propose strategies for defenders to regain the
initiative and push security solutions far beyond the reach of current security
tools -- yet those strategies start mirroring the actions and technologies of the
bad guys, and confront us with important technical, legal and moral dilemmas.",
  address="University of Hertfordshire",
  booktitle="Remodelling the Attacker",
  chapter="32583",
  edition="NEUVEDEN",
  howpublished="print",
  institution="University of Hertfordshire",
  year="2008",
  month="february",
  pages="1--6",
  publisher="University of Hertfordshire",
  type="conference paper"
}