Star 0

Abstract

Cyber attacks from foreign entities have become malicious and potentially destructive, siphoning needed dollars and time from business productivity and causing havoc with companies responsible for infrastructure. The whispered call for surreptitious retaliation has begun. What responsibility does the proxy enabler, with an unsecured network, have? What litigation options will be exercised?