Description: This presentation examines the legal regime surrounding cyberspace operations. The analysis looks at the legal underpinnings of computer network security; defense; exploitation; and, attack. After covering the laws and policies related to these topics, we will examine several of the recent incidents and intrusions that have occurred and discuss why none of them have been classified as "attacks" by those who could do so. Attendees will get an understanding of the hot legal topics in computer network operations. Past presentations have shown much of what is taken away is audience driven in response to their questions and the subsequent discussion. And, as always, I try to impress upon computer security professionals the importance of working closely with their legal counsel early and often, and explaining the technical aspects of computer security to their attorneys at a third grade level so my profession can understand it and then turn around and explain it to a judge or jury at a first grade level. (All material is unclassified and available in the public domain.)
For More Information please visit : - www.blackhat.com/usa/bh-us-12-speakers.html
Tags: securitytube , hacking , hackers , information security , convention , computer security , blackhat-usa-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.