Yes
Sometimes
No
Don't know
2. Should companies respond to hacker attacks by attacking them back?
Yes
Sometimes
No
Don't know
3. If you answered "Yes" or "Sometimes" to Q2, is it acceptable that the counter-attack be conducted ...
Electronically
Physically such as stealing or destroying attacker's equipment
Physically such as physically harming the hacker
Don't know
4. Do you consider any of the following an attack ...
a. A single ping
Yes No Sometimes Don't know
b. A port scan
Yes No Sometimes Don't know
c. Subtle "mapping" of your networks
Yes No Sometimes Don't know
5. If an attack comes from outside the USA, should a company respond with offensive software?
Yes
Sometimes
No
Don't know
6. Do you agree that responding with offensive software is the electronic equivalent of removing weapon from an attacker in the physical world?
Yes
Sometimes
No
Don't know
7. Is there a line to be drawn as to when a person or a company has the right to strike back at an attacker?
Yes
Sometimes
No
Don't know
8. The U.S. government. is developing offensive software. Should it be used?
Yes
Sometimes
No
Don't know
9. Several foreign companies and countries have said they will strike back at U.S. locations if they identify the attack as from within the United States. Should they do this?
Yes
Sometimes
No
Don't know
10. One financial institution has said it will "use every means at our disposal to protect our assets." They have built strike-back offensive capabilities. Does your company have offensive software or plan to use such techniques?
Yes
Sometimes
No
Don't know
11. If you found yourself the victim of a retribution attack, would you respond with offensive software?
Yes
Sometimes
No
Don't know