The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Lawful Trojan Horse
Abstract
News outlets don't usually report on training methods in counter-cyberterrorism, particularly lawful trojan attacks. Instead they describe recent cyberterrorist attacks, or threats, or laws and regulations concerning internet privacy or identity theft. Yet Europe is looking to do just that to head-off the next major cyberattack by creating rules for how member states should react and respond. Several news outlets, for example, reported that Germany's Federal Criminal Police Office (BKA) were using a Trojan Horse to access the smartphone data of suspected individuals before the information was encrypted. Although the urge to strike back may be palpable, hacking-back can put power back into the hands of the suspect. The consensus now is that government action is preferable to hacking-back at attackers.
Related Content
Mohd Azeem Faizi Noor, Saba Khanum, Taushif Anwar, Manzoor Ansari.
© 2023.
20 pages.
|
Padmavathi U., Narendran Rajagopalan.
© 2023.
16 pages.
|
Chandrasekar Ravi, Praveensankar Manimaran.
© 2023.
12 pages.
|
Jay Kumar Jain, Varsha Jain.
© 2023.
18 pages.
|
Dominik Hromada, Rogério Luís de C. Costa, Leonel Santos, Carlos Rabadão.
© 2023.
21 pages.
|
Santosh Kumar Smmarwar, Govind P. Gupta, Sanjay Kumar.
© 2023.
20 pages.
|
Andreia Robert Lopes, Ana Sofia Dias, Bebiana Sá-Moura.
© 2023.
24 pages.
|
|
|