请输入您要查询的百科知识:

 

词条 Cyber self-defense
释义

  1. Background

  2. Measures

  3. "Hacking back"

  4. See also

  5. References

  6. External links

{{multiple issues|{{expert needed|1=Security|date=December 2018}}{{manual|date=December 2018}}{{more citations needed|date=December 2018}}{{prose|date=December 2018}}
}}

Cyber self-defense refers to self-defense in cybersecurity to defend against cyberattack.[1] While it generally emphasizes active cybersecurity measures by computer users themselves it is sometimes also used to refer to self-defense of organizations as a whole[2] such as corporate entities or even entire nations.[3][4][5] Surveillance self-defense[6][7][8] is a variant of cyber self-defense or largely overlaps with it.

Background

Cybersecurity researcher, entrepreneur and consultant Jeffrey Carr compares cyber self-defense to martial arts with one's computer network having numerous vulnerabilities like one's body. He notes that similar to it, one's digital attack surface can be shrunk.[9]

Measures

  • Making use of antivirus software[10]
  • Making use of a firewall on Internet-connected devices[10]
  • Updating all of one's software — including but not only operating systems and potentially by the usage of dedicated updating-software[10][9]
  • Multi-factor authentication[10]
  • Strong and unique passwords for each account[10][9]
  • Encrypting one's computer and phone[10]
  • Regularly creating backups of one's data[10][11]
  • Reducing one's social networking footprint[12]
  • Uninstalling insecure software such as Adobe Flash[12][13][14]
  • Regularly checking one's social media security settings[15]
  • Paying more attention to what information one could accidentally reveal in online posts[15]
  • Not rooting one's phone[15]
  • Never giving out logins or passwords to anyone[16]
  • Using security questions and answers that are impossible for anybody else to answer even if they have access to one's social media posts or engage in social engineering[16]
  • Gathering evidence, creating documentation and contacting relevant authorities, administrators or organisations in the case of a cyberattack[16]
  • Being cautious when browsing and opening email attachments or links in emails[9]
  • Avoiding free WiFi or not logging into any accounts while using it[9]
  • Making adequate use of privacy and anonymity software
  • Publishing public keys for PGP authentication for being able to prove one's identity
  • Use the Strongest Encryption Method Your Router Offers [17]

"Hacking back"

Legal theorists and policy makers are increasingly considering authorizing the private sector to take active measures on their own through "hacking-back" (also known as hackbacks).[18][19]

The question: 'when does a cyber-attack (or threat therof) give rise to a right of self-defense?' is the subject of studies and discussion.[20]

In March 2017 Tom Graves proposed the Active Cyber Defense Certainty Act (ACDC) that would enhance the Computer Fraud and Abuse Act (CFAA) to allow individuals and the private sector to use limited defensive measures, including tools that are currently restricted under the CFAA, for identification and stopping attackers.[21][22]

Brad Maryman warns of unintended consequences, stating that in his view "the notion that we should legislate and accept a level of undocumented and unmonitored cyber actions by anyone who thinks they have been hacked is unfathomable".[22]

See also

  • Proactive cyber defence
  • CryptoParty
  • Information security
  • Internet security

References

1. ^{{cite web|last1=Whitehouse|first1=Sheldon|last2=Mikulski|first2=Barbara|last3=Snowe|first3=Olympia|title=Cyber self-defense can help U.S. security - CNN.com|url=http://edition.cnn.com/2010/OPINION/09/03/senators.cyber.security/|publisher=CNN|accessdate=13 April 2017}}
2. ^{{cite web|last1=Jr.|first1=Sydney J. Freedberg|title=Adm. Zukunft Unveils New Coast Guard Cyber Strategy|url=http://breakingdefense.com/2015/06/adm-zukunft-unveils-new-coast-guard-cyber-strategy/|website=Breaking Defense|accessdate=13 April 2017}}
3. ^{{cite web|title=Qatari tech helps Hamas in tunnels, rockets: Expert|url=http://www.timesofisrael.com/qatari-tech-helps-hamas-in-tunnels-rockets-expert/|publisher=The Times of Israel|accessdate=13 April 2017}}
4. ^{{cite web|last1=Rella|first1=Christoph|title=Neutrales Österreich setzt auf "Cyber"-Selbstverteidigung - Wiener Zeitung Online|url=http://www.wienerzeitung.at/nachrichten/oesterreich/politik/223071_Neutrales-Oesterreich-setzt-auf-Cyber-Selbstverteidigung.html|publisher=Wiener Zeitung Online|accessdate=13 April 2017|language=de}}
5. ^{{cite web|title=Cyberattacks could trigger self-defense rule, U.S. official says|url=https://www.washingtonpost.com/world/national-security/us-official-says-cyberattacks-can-trigger-self-defense-rule/2012/09/18/c2246c1a-0202-11e2-b260-32f4a8db9b7e_story.html|publisher=Washington Post|accessdate=13 April 2017}}
6. ^{{cite book|last1=Greenberg|first1=Ivan|title=Surveillance in America: Critical Analysis of the FBI, 1920 to the Present|publisher=Lexington Books|isbn=9780739172483|url=https://books.google.de/books?id=Rl_AJyXtytwC&pg=PA135|accessdate=13 April 2017}}
7. ^{{cite book|last1=Ziccardi|first1=Giovanni|title=Resistance, Liberation Technology and Human Rights in the Digital Age|publisher=Springer Science & Business Media|isbn=9789400752757|url=https://books.google.de/books?id=oYGJkc3jrosC&pg=PA167|accessdate=13 April 2017}}
8. ^{{cite web|title=EFF Relaunches Surveillance Self-Defense|url=https://www.eff.org/deeplinks/2014/10/eff-relaunches-surveillance-self-defense|publisher=Electronic Frontier Foundation|accessdate=13 April 2017|date=23 October 2014}}
9. ^{{cite web|title=Cyber Self Defense For Non-Geeks|url=https://jeffreycarr.blogspot.de/2012/03/cyber-self-defense-for-non-geeks.html|website=jeffreycarr.blogspot.de|accessdate=13 April 2017}}
10. ^{{cite web|last1=Thornton|first1=Michael|title=You Can’t Depend on Antivirus Software Anymore|url=http://www.slate.com/articles/technology/future_tense/2017/02/why_you_can_t_depend_on_antivirus_software_anymore.html|publisher=Slate|accessdate=13 April 2017|date=16 February 2017}}
11. ^{{cite web|last1=Seay|first1=Gary|title=4 Keys to Cyber Security Self-Defense|url=https://www.signix.com/digital-signatures-for-healthcare/4-keys-to-cyber-security-self-defense|accessdate=13 April 2017}}
12. ^{{cite web|last1=Firewall|first1=The|title=Cyber Self Defense: Reduce Your Attack Surface|url=https://www.forbes.com/sites/firewall/2010/05/18/cyber-self-defense-reduce-your-attack-surface/|publisher=Forbes|accessdate=13 April 2017}}
13. ^{{cite web|last1=Barrett|first1=Brian|title=Flash. Must. Die.|url=https://www.wired.com/2015/07/adobe-flash-player-die/|publisher=WIRED|accessdate=13 April 2017}}
14. ^{{cite web|last1=Whittaker|first1=Zack|title=13 new vulnerabilities? You should disable or uninstall Adobe Flash {{!}} ZDNet|url=http://www.zdnet.com/article/13-reasons-why-flash-should-die-insecure-patch-tuesday/|publisher=ZDNet|accessdate=13 April 2017}}
15. ^{{cite web|last1=Conn|first1=Richard|title=Cybersecurity Expert Gives Tips To Stay Safe Online|url=http://wuwf.org/post/cybersecurity-expert-gives-tips-stay-safe-online|accessdate=13 April 2017}}
16. ^{{cite book|last1=Moore|first1=Alexis|last2=Edwards|first2=Laurie|title=Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying|publisher=Rowman & Littlefield|isbn=9781493015429|url=https://books.google.de/books?id=BfLDBAAAQBAJ}}
17. ^{{Cite web |last1=Stoner |first1=Daniel |url=https://www.safetydetective.com/blog/hackers-love-iot-products-heres-how-to-keep-them-out/ |title=Hackers Love IoT Products: Here's How to Keep Them Out |website=Safety Detective |language=en-US |access-date=2018-11-22}}
18. ^{{cite web|title=International Law and Private Actor Active Cyber Defensive Measures|url=https://www.lawfareblog.com/international-law-and-private-actor-active-cyber-defensive-measures|website=Lawfare|accessdate=13 April 2017|date=29 May 2013}}
19. ^{{cite news |last1=Brown |first1=Megan L. |title=Authorizing Private Hackback Would Be a Wild West for Cybersecurity |url=https://www.law.com/legaltechnews/2018/09/06/authorizing-private-hackback-would-be-a-wild-west-for-cybersecurity/ |accessdate=7 September 2018 |publisher=Law.com |date=September 6, 2018}}
20. ^{{cite journal|last1=Waxman|first1=Matthew C.|title=Self-Defensive Force Against Cyber Attacks: Legal, Strategic and Political Dimensions|date=19 March 2013|ssrn=2235838|accessdate=}}
21. ^{{cite web|last1=Hawkins|first1=Garrett|title=Rep. Tom Graves Proposes Cyber Self Defense Bill|url=http://www.thedallasnewera.com/local-news/1657-rep-tom-graves-proposes-cyber-self-defense-bill|website=www.thedallasnewera.com|accessdate=13 April 2017}}
22. ^{{cite web|title='Self-Defense' Bill Would Allow Victims to Hack Back|url=https://www.usnews.com/news/articles/2017-03-09/self-defense-bill-would-allow-victims-to-hack-back|accessdate=13 April 2017}}

External links

  • Cybersecurity self-defense, Slate
  • {{cite book|last1=Moore|first1=Alexis|last2=Edwards|first2=Laurie|title=Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying|publisher=Rowman & Littlefield|isbn=9781493015429|url=https://books.google.de/books?id=BfLDBAAAQBAJ}}
  • [https://ssd.eff.org/ Surveillance Self-Defense], EFF
  • [https://www.youtube.com/watch?v=knLDY7hRm5I Paul Carugati: Cyber Self-Defense], TED talk
  • [https://www.coruscan.com/cyber-risk/ Am I at risk of being hacked? A Cyber Self-Defense Test], Coruscan.com

2 : Self-defense|Computer security

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/21 2:43:32