The new offensive cyber security: Strategically using asymmetrical tactics to promote information security
Christopher Ott
Additional contact information
Christopher Ott: Rothwell Figg, USA
Cyber Security: A Peer-Reviewed Journal, 2022, vol. 5, issue 4, 286-293
Abstract:
Since the very first hack, cyber security professionals have sought to take the fight back to the hackers. Offensive cyber security operations usually focus upon proactive technical attacks on hackers to disrupt their operations and deter future attacks, and there are currently efforts by governments to expand these capabilities. Cyber security professionals are locked in an unfair, asymmetrical conflict with hackers, but they need not confine their thinking to historical rules of engagement. This paper briefly traces the theories of asymmetrical warfare in the 21st century, including its cyber security dimensions, to explore how companies and cyber security decision makers can learn from the lessons of the past while changing the rules of the conflict in their favour.
Keywords: cyber security; asymmetrical warfare; offensive cyber security; active cyber security defence; cyber security theories (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/7003/download/ (application/pdf)
https://hstalks.com/article/7003/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2022:v:5:i:4:p:286-293
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().