Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
- 14.1 Introduction: Dilemmas of Cybersecurity Service Providers
- 14.1.1 Example: Dealing with Governmental Malware
- 14.2.1 Customer Data Handling
- 14.2.2 Information About Breaches
- 14.2.3 Threat Intelligence Activities
- 14.2.4 Vulnerability-Related Information
- 14.2.5 Data Sharing with Peers
- Quiz 14.2 5 questions
Well done!
You have completed (UPI) Chapter 14: Best Practices and Recommendations for Cybersecurity Service Providers!
Instruction
14.1.1 Example: Dealing with Governmental Malware
The use of malware by governments and Law Enforcement Agencies (LEA) for surveillance and other purposes is a widely accepted fact. In 2014, F-Secure's CRO Mikko Hyppönen said: "If someone had come to me ten years ago and told me that by 2014 it will be commonplace for democratic Western governments to write viruses and actively deploy them against other governments, even friendly governments, ...