Talk With an Expert

Deterring Cyber Attacks

Deterring Cyber Attacks (PDF, 1.65MB)Published: 27 Jan, 2002
Created by:
Christy Bilardo

In the past, many companies chose not to share information on cyber attacks with authorities or with watchdog groups for fear that negative publicity would decrease consumer and investor confidence and lead to potential profit losses. In the wake of the recent terrorist attacks, some companies, especially those in 'commercial infrastructure' areas [telecommunications energy transportation banking & finance and emergency services] may decide that protecting homeland security requires overlooking legitimate corporate concerns and working with outside groups to deter and defend against cyber attacks. If your company decides to rethink its policy and you are asked for recommendations this paper provides a Strengths Weaknesses Opportunities and Threats [SWOT] Analysis to help you analyze three alternatives and recommend the best one to upper management. The three alternatives are: (1) inform the authorities and if possible prosecute the perpetrators (2) share the attack/recovery information with an Information Sharing and Analysis Center [ISAC] group or (3) share the attack/recovery information with the CERT [Computer Emergency Response Team] Command Center. A Next Steps guide is also included for each alternative to help you implement your new policy.

Deterring Cyber Attacks