• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Attack of the Hack Back

October 17, 2017 by Jonathan Duani 2 Comments

This is a pretty interesting article about legislation that is coming up currently. This is because they are saying that is now legal for you to hack a person who is hacking into you. It could be more dangerous than the initial attack cause you are opening yourself up even more to this attacker by going in. What do you think? Do you think it is a bad idea?

Source: http://www.slate.com/articles/technology/future_tense/2017/10/hacking_back_the_worst_idea_in_cybersecurity_rises_again.html

Filed Under: Week 08: Social Engineering, Encoding and Encryption Tagged With:

Reader Interactions

Comments

  1. Donald Hoxhaj says

    October 22, 2017 at 3:15 pm

    Jonathan – Your article is an eye opener to the true definition of Ethical Hacking itself. It would be surprising to see such legislation practiced that allows people to hack a person who is hacking into you. I think that is not a bad idea after all because as long as people have the right tools and techniques that prevent them from such external attacks, it is good. However, there is a paradox too. The learning of such skills should not pave the way for more hacking as people now have the desired knowledge to protect or hack into systems.

    Log in to Reply
  2. Amanda M Rossetti says

    October 24, 2017 at 1:38 pm

    I agree with the author that ‘hacking back’ is a terrible idea and should not be legal. There is no way to draw a clean line on what is ‘hacking back’ and was is just plain hacking. The writers of the bill couldn’t even do it, evidenced in the contradictory wording about when ‘hacking back’ is allowed. If you figure out that someone has hacked you and you ‘hack back’ to get your data back, how far is too far? Can you take the whole database where your data is held even if some of it isn’t your data? They’d basically be opening the floodgates for just hack whoever they want and then pretend the other side started it, essentially making the laws that make hacking illegal moot.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in