Mitigating Cyberattacks: The Roles of Governments and Private Companies
VerifiedAdded on 2019/09/16
|11
|3259
|347
Essay
AI Summary
The political and government considerations and laws limit the actions of private companies against cyber criminals in the United Kingdom. Despite this, many UK companies have invested significantly in their cyber security to prevent attacks. However, the government's lack of effective legislation on cyber-attacks means that private companies may not be able to take more action against hackers. The concept of 'hack back' is seen as a possible solution, where companies can counterattack against attackers. While there are arguments for and against this approach, it highlights the need for stricter laws and guidelines to mitigate cyber-attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1
SIGNIFICANCE OF GOVERNMENTS AND PRIVATE
COMPANIES FOR MITIGATING CYBER-ATTACK
STUDENT NAME:
STUDENT ID:
SIGNIFICANCE OF GOVERNMENTS AND PRIVATE
COMPANIES FOR MITIGATING CYBER-ATTACK
STUDENT NAME:
STUDENT ID:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
Table of Contents
Introduction......................................................................................................................................3
Efficiency of private companies and governments to mitigate cyber-attack...................................3
The importance of hack back policy for mitigating the cyber-attack issues...................................6
Conclusion.......................................................................................................................................8
References......................................................................................................................................10
Table of Contents
Introduction......................................................................................................................................3
Efficiency of private companies and governments to mitigate cyber-attack...................................3
The importance of hack back policy for mitigating the cyber-attack issues...................................6
Conclusion.......................................................................................................................................8
References......................................................................................................................................10
3
Should private companies and governments be able to mitigate a cyber-attack by destructively
counter-striking against attackers? Is this a proactive policy to help insulate critical services
from damage as well as mitigate harm from potential attacks or merely “hack back”
vigilantism?
Introduction
A positive cyber-attack can be responsible for serious damage to an organization as it completely
demolishes the trust of the customers and the brand reputation. According to Ridand Buchanan
(2015), the cyber-attacks can lead to a dangerous outcome of financial loss that can be arrived
from the theft of the relevant corporate information, financial information, business contracts and
money. In today’s competitive business world, most of the companies engage efficient software
developers and experts in order to mitigate the issues related to the cyber-attack within a short
period.
This particular discourse will discuss the efficiency of the private companies and the government
of the United Kingdom (UK) for resolving the cyber-attack issues in an immense manner. Even
there will be an exploration of the relevant policies that may prevent the cyber-attacks within
organizations. Various legal consequences will be elaborated in order to provide a detailed view
of the efficiency of the UK government for mitigating the cyber-attacks.
Efficiency of private companies and governments to mitigate cyber-attack
The current researches have revealed the fact that most of the companies' information are not
secured, therefore, there is a high possibility of cyber-attack. The recent cyber-attack of the
leading website hosting firm of the United Kingdom, named Easily.co.uk is the evidence of the
research (Website hosting company easily hit by cyber-attack, 2017). Due to the hacking, this
particular company has lost its required data and the internal networking system has been
completely damaged. Even the current cyber-attacks, such as WannaCry, JD Wetherspoon, and
TalkTalk have highlighted the poor networking system and policies of the organizations across
the world. Rosenzewig(2014) has mentioned thatthe cyber-attacks actually enhances the business
Should private companies and governments be able to mitigate a cyber-attack by destructively
counter-striking against attackers? Is this a proactive policy to help insulate critical services
from damage as well as mitigate harm from potential attacks or merely “hack back”
vigilantism?
Introduction
A positive cyber-attack can be responsible for serious damage to an organization as it completely
demolishes the trust of the customers and the brand reputation. According to Ridand Buchanan
(2015), the cyber-attacks can lead to a dangerous outcome of financial loss that can be arrived
from the theft of the relevant corporate information, financial information, business contracts and
money. In today’s competitive business world, most of the companies engage efficient software
developers and experts in order to mitigate the issues related to the cyber-attack within a short
period.
This particular discourse will discuss the efficiency of the private companies and the government
of the United Kingdom (UK) for resolving the cyber-attack issues in an immense manner. Even
there will be an exploration of the relevant policies that may prevent the cyber-attacks within
organizations. Various legal consequences will be elaborated in order to provide a detailed view
of the efficiency of the UK government for mitigating the cyber-attacks.
Efficiency of private companies and governments to mitigate cyber-attack
The current researches have revealed the fact that most of the companies' information are not
secured, therefore, there is a high possibility of cyber-attack. The recent cyber-attack of the
leading website hosting firm of the United Kingdom, named Easily.co.uk is the evidence of the
research (Website hosting company easily hit by cyber-attack, 2017). Due to the hacking, this
particular company has lost its required data and the internal networking system has been
completely damaged. Even the current cyber-attacks, such as WannaCry, JD Wetherspoon, and
TalkTalk have highlighted the poor networking system and policies of the organizations across
the world. Rosenzewig(2014) has mentioned thatthe cyber-attacks actually enhances the business
4
risks of the company. Therefore, it is high time for the government of the United Kingdom in
order to take effective measures for mitigating such issues. The government of UK has the least
idea regarding the recent ransomware attack in the health system of the UK, which is considered
as an innovative way of hacking as it captures the entire control of the system and asks ransom in
digital money (bitcoin). However, the National Cyber Security Center of Britain can be
considered as a perfect initiative for mitigating the issues related to the cyber-attacks (UK
government in dark over who behind cyber-attack, 2017). Still, in the ransomware case of the
health system, the professionals are in the dark although they are constantly working with the
health services personnel for finding out who are there behind this cyber-attack.
The existing laws and legislations of the United Kingdom should be stringent enough in order to
prevent the cyber-attack as it leads towards a serious destruction of the companies. Although UK
legislations involves the Computer Misuse Act 1990 for dealing with the hackers. Still, this
particular law is not suitable always for preventing the cyber-attack in large companies.
Computer Misuse Act 1990 helps the organizations to secure their computer materials against
any kind of unauthorized modification or access. This specific act should be developed and strict
for handling the cyber-attack of present days. On the other hand, Denning(2014) has observed
that it is the spam, which actually moves towards the fake websites, which steals the gathered
data. However, in order to address this issues, the Privacy and Electronic Regulations of UK are
suitable. Even the independent authority of the United Kingdom are set up for promoting the
access to the official information and protecting the personal data.
The critics have argues that these days, the incidents of cyber-attack has been enhanced only
because of the limitation of the legislations of UK. The penalties of cyber-attack are inadequate,
therefore, the hackers breach the regulations without any hesitation and fear. With the constant
development of the modern technology, the government and the private companies should
improve their existing policies, norms and regulations for mitigating the cyber-attack by counter-
striking against the hackers in a destructive manner. Iasiello(2014) has commented that the
professionals of information technology security perceive the new legislations of the government
as a perfect way of retaliating against the cyber hackers. Even the UK laws support and authorize
to follow "hack back" rather than trusting on the centralized establishments to retort.
risks of the company. Therefore, it is high time for the government of the United Kingdom in
order to take effective measures for mitigating such issues. The government of UK has the least
idea regarding the recent ransomware attack in the health system of the UK, which is considered
as an innovative way of hacking as it captures the entire control of the system and asks ransom in
digital money (bitcoin). However, the National Cyber Security Center of Britain can be
considered as a perfect initiative for mitigating the issues related to the cyber-attacks (UK
government in dark over who behind cyber-attack, 2017). Still, in the ransomware case of the
health system, the professionals are in the dark although they are constantly working with the
health services personnel for finding out who are there behind this cyber-attack.
The existing laws and legislations of the United Kingdom should be stringent enough in order to
prevent the cyber-attack as it leads towards a serious destruction of the companies. Although UK
legislations involves the Computer Misuse Act 1990 for dealing with the hackers. Still, this
particular law is not suitable always for preventing the cyber-attack in large companies.
Computer Misuse Act 1990 helps the organizations to secure their computer materials against
any kind of unauthorized modification or access. This specific act should be developed and strict
for handling the cyber-attack of present days. On the other hand, Denning(2014) has observed
that it is the spam, which actually moves towards the fake websites, which steals the gathered
data. However, in order to address this issues, the Privacy and Electronic Regulations of UK are
suitable. Even the independent authority of the United Kingdom are set up for promoting the
access to the official information and protecting the personal data.
The critics have argues that these days, the incidents of cyber-attack has been enhanced only
because of the limitation of the legislations of UK. The penalties of cyber-attack are inadequate,
therefore, the hackers breach the regulations without any hesitation and fear. With the constant
development of the modern technology, the government and the private companies should
improve their existing policies, norms and regulations for mitigating the cyber-attack by counter-
striking against the hackers in a destructive manner. Iasiello(2014) has commented that the
professionals of information technology security perceive the new legislations of the government
as a perfect way of retaliating against the cyber hackers. Even the UK laws support and authorize
to follow "hack back" rather than trusting on the centralized establishments to retort.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
All of the large companies should lessen the risks of being repeatedly by adopting a perfect
active defense approach of online security. The organizations should improve their policies and
strategy for identifying the attackers. Even these private companies of UK can take help of the
local security authorities, which are capable of working with the private companies in a close
manner for securing their entire computer system from the cyber-attack. As the cyber-attack has
been enhanced in this present days, therefore, retaliation can be considered as an apt answer for
the cyber-attackers. However, on the other hand, Cerrudo(2015) has contradicted that the
government should take a positive step for mitigating this issues rather than authorizing the
private companies to strike back against the cyber-hackers.
The recent researches on the cyber-attack of UK have shown the fact that the stealing of
confidential data is constantly increasing. The hackers have attacked more than 90% major
companies of the UK. From the leading retail chain to the health service provider organizations,
all are the target of these cyber-criminals. As opined by Timberget al.(2014), such cyber-attacks
are also the reason of economical turnover in the UK, which has been emerged day by day. The
hackers even attack the official website of the British Airways in the last march, which leads its
customers and the higher authority towards a confusing stage. However, Peterson(2013) has
suggested that the cyber-attack can be concerned as the cyber-terrorism, which destroys the
networks of the computer communications incomplete manner.
The private companies of UK usually take various ways of defending the cyber-attack. The first
one is obviously prevention, the software professionals of the companies install the antivirus and
other required things for preventing the cyber-attack. Even the infrastructure of the organization
should strong enough to protect the cyber-attack. It is a noteworthy fact to mention here that, the
private companies need a help of the government for mitigating the cyber-attack by following the
"hack back" policy. The UK government should have a proper and adequate knowledge
regarding the present unique issues faced by the private companies. For instances, the
government should know the process of handling the remote workforce, which fails to follow the
corporate security policies and there are shortages of the security talent. Messerschmidt(2013)
has observed that on certain occasions, the private companies fail to incorporate required security
policies only because of the lack of security professionals within the organization.
All of the large companies should lessen the risks of being repeatedly by adopting a perfect
active defense approach of online security. The organizations should improve their policies and
strategy for identifying the attackers. Even these private companies of UK can take help of the
local security authorities, which are capable of working with the private companies in a close
manner for securing their entire computer system from the cyber-attack. As the cyber-attack has
been enhanced in this present days, therefore, retaliation can be considered as an apt answer for
the cyber-attackers. However, on the other hand, Cerrudo(2015) has contradicted that the
government should take a positive step for mitigating this issues rather than authorizing the
private companies to strike back against the cyber-hackers.
The recent researches on the cyber-attack of UK have shown the fact that the stealing of
confidential data is constantly increasing. The hackers have attacked more than 90% major
companies of the UK. From the leading retail chain to the health service provider organizations,
all are the target of these cyber-criminals. As opined by Timberget al.(2014), such cyber-attacks
are also the reason of economical turnover in the UK, which has been emerged day by day. The
hackers even attack the official website of the British Airways in the last march, which leads its
customers and the higher authority towards a confusing stage. However, Peterson(2013) has
suggested that the cyber-attack can be concerned as the cyber-terrorism, which destroys the
networks of the computer communications incomplete manner.
The private companies of UK usually take various ways of defending the cyber-attack. The first
one is obviously prevention, the software professionals of the companies install the antivirus and
other required things for preventing the cyber-attack. Even the infrastructure of the organization
should strong enough to protect the cyber-attack. It is a noteworthy fact to mention here that, the
private companies need a help of the government for mitigating the cyber-attack by following the
"hack back" policy. The UK government should have a proper and adequate knowledge
regarding the present unique issues faced by the private companies. For instances, the
government should know the process of handling the remote workforce, which fails to follow the
corporate security policies and there are shortages of the security talent. Messerschmidt(2013)
has observed that on certain occasions, the private companies fail to incorporate required security
policies only because of the lack of security professionals within the organization.
6
The private companies of UK gain the access to the detailed threats information and the higher
authority helps to figure out how to strengthen their computer networks. The maintenance of the
cybersecurity has become a major challenge for the private companies and the government of the
United Kingdom as it creates a large hindrance to the long-awaited transformation in the digital
world. Following the report of the media, sport and culture, it can be stated that most of the large
companies of UK have faced the issues of cyber-attack. The Data Protection Act of the United
Kingdom should be developed as it helps the private companies to manage the basic security of
the personal data of the customers. Geerset al.(2014) have mentioned that the private companies
may incorporate the regulatory sanctions and fine in order to comply with the legislations related
to the data protection. On the other hand, in order to minimize the cyber-attack problems, the
private organizations of UK can clean up the affected systems. There are various contradictions
related to whether it is right to mitigate the cyber-attack by counter strike the hackers or not.
Although the private organizations intend to retaliate against the hackers, still the existing
legislations of the UK government stop them doing so. If the government of the United Kingdom
refuses to prosecute the cyber criminals then the private companies will counter strike against the
hackers and that will be a breach or violation of the legislations.
The importance of hack back policy for mitigating the cyber-attack issues
Most of the companies cannot follow the hack back policy as it is illegal. However, there are also
arguments regarding legalizing this hack back policy for securing the corporate information of
the private companies. As opined by Bronkand Tikk-Ringas(2013), the hack back method
against the cyber criminals will actually make them afraid of practicing the cyber-attack gong
against the legislations and laws. The private companies and the government of the United
Kingdom have mounted a perfect fightback policy for reinforcing their defenses. Even there are
some procedures, which neutralize the constant threats from the attackers. However, the
attackers are always more powerful than the private companies as they are equipped with the
advanced technologies, whereas, the political and the government considerations and laws limit
the action of the companies against the cyber criminals.
The private companies of the United Kingdom have invested a lump sum money in their cyber
security for preventing the cyber-attack. From bank to the retail companies, from entertainment
The private companies of UK gain the access to the detailed threats information and the higher
authority helps to figure out how to strengthen their computer networks. The maintenance of the
cybersecurity has become a major challenge for the private companies and the government of the
United Kingdom as it creates a large hindrance to the long-awaited transformation in the digital
world. Following the report of the media, sport and culture, it can be stated that most of the large
companies of UK have faced the issues of cyber-attack. The Data Protection Act of the United
Kingdom should be developed as it helps the private companies to manage the basic security of
the personal data of the customers. Geerset al.(2014) have mentioned that the private companies
may incorporate the regulatory sanctions and fine in order to comply with the legislations related
to the data protection. On the other hand, in order to minimize the cyber-attack problems, the
private organizations of UK can clean up the affected systems. There are various contradictions
related to whether it is right to mitigate the cyber-attack by counter strike the hackers or not.
Although the private organizations intend to retaliate against the hackers, still the existing
legislations of the UK government stop them doing so. If the government of the United Kingdom
refuses to prosecute the cyber criminals then the private companies will counter strike against the
hackers and that will be a breach or violation of the legislations.
The importance of hack back policy for mitigating the cyber-attack issues
Most of the companies cannot follow the hack back policy as it is illegal. However, there are also
arguments regarding legalizing this hack back policy for securing the corporate information of
the private companies. As opined by Bronkand Tikk-Ringas(2013), the hack back method
against the cyber criminals will actually make them afraid of practicing the cyber-attack gong
against the legislations and laws. The private companies and the government of the United
Kingdom have mounted a perfect fightback policy for reinforcing their defenses. Even there are
some procedures, which neutralize the constant threats from the attackers. However, the
attackers are always more powerful than the private companies as they are equipped with the
advanced technologies, whereas, the political and the government considerations and laws limit
the action of the companies against the cyber criminals.
The private companies of the United Kingdom have invested a lump sum money in their cyber
security for preventing the cyber-attack. From bank to the retail companies, from entertainment
7
organizations to the healthcare service providers – every organization of UK has become victims
of the cyber criminals.Messerschmidt(2013) has observed that the major responsibility of the
higher authority of the organization to prevent the cyber-attack is to bolster their defenses for
protecting their intellectual property, data of the clients and relevant financial information. The
active defense tools such as annoyance, attack and attribution are effective self-defense system of
the private companies. Following the hack back policy, the private companies can actually have
an access on the computer of the hackers for deleting the stolen data in order to take revenge.
Every cyber-attack issues are unique and completely different with the other only because of
incredibly fast-changing technology. The government should allow the private companies to take
more action against the hackers although hack back is illegal.
The poor legislations of the United Kingdom regarding the cyber-attack is not effective enough,
therefore, the government should allow the companies to take effective measures for protecting
themselves. Harrington(2014) has mentioned that there are requirements of hack back as a
perfect self-defense system of the private companies with the help of modern and advanced
technology. However, the legal framework of the United Kingdom does not allow the companies
to hack back the hackers as it raises the questions upon being ethical. On the other hand, the
exact timing of decisions of hacking back is essential to the basic mobility of the attacker and the
economic losses increasing. However, the legal hack pack policy may encourage the vigilante
actions over the legal remedies. The fundamental effects of legitimizing the hack back as an apt
self-defense of the companies will be categorized in two extremes in future – the protected e-
commerce and the public access to the corporate information, which will enhance the customer
relationship.
Watkins(2014) has suggested that the legal hack back can provide a remedy and deterrence for
the cyber-attackers. The prevention of cyber-attacks relies on the protecting the innocent
computer networking system. If the government of the United Kingdom has legalized hack back
then the private companies will set up adequate tools related to the hack back, which will
eventually stop the internet attacks in an immense manner. There are few technical problems
with the back hacking process, however, in future with the advanced technology, this problem
will be solved. According to Ridand Buchanan (2015), the major challenges of incorporating and
promoting hack back consider the identification, law enforcement and the legal liability. The
organizations to the healthcare service providers – every organization of UK has become victims
of the cyber criminals.Messerschmidt(2013) has observed that the major responsibility of the
higher authority of the organization to prevent the cyber-attack is to bolster their defenses for
protecting their intellectual property, data of the clients and relevant financial information. The
active defense tools such as annoyance, attack and attribution are effective self-defense system of
the private companies. Following the hack back policy, the private companies can actually have
an access on the computer of the hackers for deleting the stolen data in order to take revenge.
Every cyber-attack issues are unique and completely different with the other only because of
incredibly fast-changing technology. The government should allow the private companies to take
more action against the hackers although hack back is illegal.
The poor legislations of the United Kingdom regarding the cyber-attack is not effective enough,
therefore, the government should allow the companies to take effective measures for protecting
themselves. Harrington(2014) has mentioned that there are requirements of hack back as a
perfect self-defense system of the private companies with the help of modern and advanced
technology. However, the legal framework of the United Kingdom does not allow the companies
to hack back the hackers as it raises the questions upon being ethical. On the other hand, the
exact timing of decisions of hacking back is essential to the basic mobility of the attacker and the
economic losses increasing. However, the legal hack pack policy may encourage the vigilante
actions over the legal remedies. The fundamental effects of legitimizing the hack back as an apt
self-defense of the companies will be categorized in two extremes in future – the protected e-
commerce and the public access to the corporate information, which will enhance the customer
relationship.
Watkins(2014) has suggested that the legal hack back can provide a remedy and deterrence for
the cyber-attackers. The prevention of cyber-attacks relies on the protecting the innocent
computer networking system. If the government of the United Kingdom has legalized hack back
then the private companies will set up adequate tools related to the hack back, which will
eventually stop the internet attacks in an immense manner. There are few technical problems
with the back hacking process, however, in future with the advanced technology, this problem
will be solved. According to Ridand Buchanan (2015), the major challenges of incorporating and
promoting hack back consider the identification, law enforcement and the legal liability. The
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
present cyber-attacks are turning to the infrastructure attacks of the entire business industry,
which affects the business in a massive manner. At present, there are no consistently domestic or
international effective criminal laws in order to deal with the cyber-attacks in a proper manner.
The passive defense approaches, such as the software patches, antivirus software and the
firewalls do not need the efficient hackers to be recognized to be operative. On the other hand, a
mitigative counter strike will include various activities that are undertaken in self-defense for
interjecting the attack in advancement. It also resolves the immediate damage to a target system.
However, the basic notion of the counterattack is powerful in extreme manner as it traces every
step of the attackers, such as their positions, and infrastructure and supply lines in order to take
revenge. The pre-emptive attacks and the vigilante counterattacks are considered as a violation of
the rules and legislations of the United Kingdom. Taking revenge is a straightforward appeal and
treat the entire thing as a military problem, which is way easier than working within the legal
framework and system. The higher management of the cyber security of most of the British
companies punish the cyber criminals following the hack back policy.
There are also incidents, which show that with the available information of the attacker, the
private companies of UK find themselves in dilemma to counter attack for their self-defense in
an immediate manner, inform the proper authorities of law enforcement or retaliate for
discouragement in future. Cerrudo (2015) has pointed out that the higher management should
take the decisions whether they should follow the hack back policy or to sit back observing the
measures taken by the government. The counter attack can be responsible for inviting the future
problems, such as further cyber-attack of the websites.
Most of the organizations consider hack back as ethically and morally wrong and it is the
practice of vigilantism. It is the contradictory matter that whether the hack back policy is apt or
the government should take effective measures for resolving the cyber-attack within the network
system of the organization. The counter attacking falls in between a large area of stooping to the
basic levels of the original developer of malevolent code and rational self-defense. A sound risk
management may become vital for resolving cyber-attack. The counter attack policies should be
investigated as it needs a perfect direction to be handled (Watkins, 2014). Even in certain cases,
the counter attack against the hackers has been proved as a proactive policy adopted by the
organization for mitigating the harm from any kind of potential cyber-attack.
present cyber-attacks are turning to the infrastructure attacks of the entire business industry,
which affects the business in a massive manner. At present, there are no consistently domestic or
international effective criminal laws in order to deal with the cyber-attacks in a proper manner.
The passive defense approaches, such as the software patches, antivirus software and the
firewalls do not need the efficient hackers to be recognized to be operative. On the other hand, a
mitigative counter strike will include various activities that are undertaken in self-defense for
interjecting the attack in advancement. It also resolves the immediate damage to a target system.
However, the basic notion of the counterattack is powerful in extreme manner as it traces every
step of the attackers, such as their positions, and infrastructure and supply lines in order to take
revenge. The pre-emptive attacks and the vigilante counterattacks are considered as a violation of
the rules and legislations of the United Kingdom. Taking revenge is a straightforward appeal and
treat the entire thing as a military problem, which is way easier than working within the legal
framework and system. The higher management of the cyber security of most of the British
companies punish the cyber criminals following the hack back policy.
There are also incidents, which show that with the available information of the attacker, the
private companies of UK find themselves in dilemma to counter attack for their self-defense in
an immediate manner, inform the proper authorities of law enforcement or retaliate for
discouragement in future. Cerrudo (2015) has pointed out that the higher management should
take the decisions whether they should follow the hack back policy or to sit back observing the
measures taken by the government. The counter attack can be responsible for inviting the future
problems, such as further cyber-attack of the websites.
Most of the organizations consider hack back as ethically and morally wrong and it is the
practice of vigilantism. It is the contradictory matter that whether the hack back policy is apt or
the government should take effective measures for resolving the cyber-attack within the network
system of the organization. The counter attacking falls in between a large area of stooping to the
basic levels of the original developer of malevolent code and rational self-defense. A sound risk
management may become vital for resolving cyber-attack. The counter attack policies should be
investigated as it needs a perfect direction to be handled (Watkins, 2014). Even in certain cases,
the counter attack against the hackers has been proved as a proactive policy adopted by the
organization for mitigating the harm from any kind of potential cyber-attack.
9
Conclusion
In future, there will be some serious legislations incorporated by the government of the United
Kingdom in order to mitigate the issues related to the cyber-attack. In this era of globalization,
cyber-attack has become rapid and there are requirements of high standard security of the
computer network, which will prevent such attacks from the hackers. The government of the UK
should enforce appropriate guidelines or rules for mitigating the issues of cyber-attack. On the
completion of this study, it can be stated that the private companies should take help of the local
governments for mitigating the cyber-attack by counterstriking against the attackers in a
destructive manner. The contradictions regarding the counter attack for taking the revenge
against the cyber criminals are elaborated in a detailed manner. The stringent policies will reduce
any incident of the hacking at the same time enhance the chances of a smoother and hassel be
online business operations.
Conclusion
In future, there will be some serious legislations incorporated by the government of the United
Kingdom in order to mitigate the issues related to the cyber-attack. In this era of globalization,
cyber-attack has become rapid and there are requirements of high standard security of the
computer network, which will prevent such attacks from the hackers. The government of the UK
should enforce appropriate guidelines or rules for mitigating the issues of cyber-attack. On the
completion of this study, it can be stated that the private companies should take help of the local
governments for mitigating the cyber-attack by counterstriking against the attackers in a
destructive manner. The contradictions regarding the counter attack for taking the revenge
against the cyber criminals are elaborated in a detailed manner. The stringent policies will reduce
any incident of the hacking at the same time enhance the chances of a smoother and hassel be
online business operations.
10
References
Bronk, C. and Tikk-Ringas, E., 2013. Hack or attack? Shamoon and the Evolution of Cyber
Conflict. Shamoon and the Evolution of Cyber Conflict (Feb, 1, p.2013.
Cerrudo, C., 2015. An emerging us (and world) threat: Cities wide open to cyber
attacks. Securing Smart Cities.
Denning, D.E., 2014. Framework and principles for active cyber defense. Computers &
Security, 40, pp.108-113.
Geers, K., Kindlund, D., Moran, N. and Rachwald, R., 2014. World War C: Understanding
nation-state motives behind today’s advanced cyber attacks. Technical report, FireEye.
Harrington, S.L., 2014. Cyber Security Active Defense: Playing with Fire or Sound Risk
Management?. Rich. JL & Tech., 20, pp.12-14.
Iasiello, E., 2014. Hacking back: not the right solution. Parameters, 44(3), p.105.
Messerschmidt, J.E., 2013. Hackback: Permitting retaliatory hacking by non-state actors as
proportionate countermeasures to transboundary cyberharm. Colum. J. Transnat'l L., 52, p.275.
Peterson, D., 2013. Offensive cyber weapons: construction, development, and
employment. Journal of Strategic Studies, 36(1), pp.120-124.
Rid, T. and Buchanan, B., 2015. Attributing cyber attacks. Journal of Strategic Studies, 38(1-2),
pp.4-37.
Rosenzewig, P., 2014. International law and private actor active cyber defensive measures. Stan.
J. Int'l L., 50, p.103.
Timberg, C., Nakashima, E. and Douglas-Gabriel, D., 2014. Cyberattacks trigger talk of
‘hacking back’. The Washington Post.
UK government in dark over who behind cyber attack (2017) Reuters, Available from:
http://www.reuters.com/article/us-cyber-attack-britain-idUSKBN18905M?il=0 (accessed 22
May 2017).
References
Bronk, C. and Tikk-Ringas, E., 2013. Hack or attack? Shamoon and the Evolution of Cyber
Conflict. Shamoon and the Evolution of Cyber Conflict (Feb, 1, p.2013.
Cerrudo, C., 2015. An emerging us (and world) threat: Cities wide open to cyber
attacks. Securing Smart Cities.
Denning, D.E., 2014. Framework and principles for active cyber defense. Computers &
Security, 40, pp.108-113.
Geers, K., Kindlund, D., Moran, N. and Rachwald, R., 2014. World War C: Understanding
nation-state motives behind today’s advanced cyber attacks. Technical report, FireEye.
Harrington, S.L., 2014. Cyber Security Active Defense: Playing with Fire or Sound Risk
Management?. Rich. JL & Tech., 20, pp.12-14.
Iasiello, E., 2014. Hacking back: not the right solution. Parameters, 44(3), p.105.
Messerschmidt, J.E., 2013. Hackback: Permitting retaliatory hacking by non-state actors as
proportionate countermeasures to transboundary cyberharm. Colum. J. Transnat'l L., 52, p.275.
Peterson, D., 2013. Offensive cyber weapons: construction, development, and
employment. Journal of Strategic Studies, 36(1), pp.120-124.
Rid, T. and Buchanan, B., 2015. Attributing cyber attacks. Journal of Strategic Studies, 38(1-2),
pp.4-37.
Rosenzewig, P., 2014. International law and private actor active cyber defensive measures. Stan.
J. Int'l L., 50, p.103.
Timberg, C., Nakashima, E. and Douglas-Gabriel, D., 2014. Cyberattacks trigger talk of
‘hacking back’. The Washington Post.
UK government in dark over who behind cyber attack (2017) Reuters, Available from:
http://www.reuters.com/article/us-cyber-attack-britain-idUSKBN18905M?il=0 (accessed 22
May 2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
Watkins, B., 2014. The Impact of Cyber Attacks on the Private Sector. Briefing Paper,
Association for International Affair, p.12.
Website hosting company Easily hit by cyber attack (2017) Ft.com, Available from:
https://www.ft.com/content/69bcecf6-9f60-11e5-beba-5e33e2b79e46 (accessed 22 May 2017).
Watkins, B., 2014. The Impact of Cyber Attacks on the Private Sector. Briefing Paper,
Association for International Affair, p.12.
Website hosting company Easily hit by cyber attack (2017) Ft.com, Available from:
https://www.ft.com/content/69bcecf6-9f60-11e5-beba-5e33e2b79e46 (accessed 22 May 2017).
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.