Skip to Main Content
Article navigation

Introduces the subject with the classical three‐layer security paradigm for information assurance of “protect, detect, react”, noting that it leaves open the question of who or what should react, and how. Lists 15 technical possibilities for a reactive defence to a presumed intrusion which vary greatly in their degree of aggression, mentions the problem of false positives in cases of active defence strategies, and relates the strategies to relevant legal and ethical considerations. Concludes that verification of a genuine intrusion incident is often very difficult, but the cost of failure will also be high; this is linked to the asymmetric nature of information warfare, where the cost of defence is much higher than the cost of attack.

This content is only available via PDF.
You do not currently have access to this content.
Don't already have an account? Register

Purchased this content as a guest? Enter your email address to restore access.

Please enter valid email address.
Email address must be 94 characters or fewer.
Pay-Per-View Access
$41.00
Rental

or Create an Account

Close Modal
Close Modal