Wonder what the aftereffect of a terrorist attack on the Internet would look like? The way we're responding to contaminated spinach provides a clue.
Wonder what the aftereffect of a terrorist attack on the Internet would look like? The way we're responding to contaminated spinach provides a clue.Nearly every bag of spinach in the United States is E. coli-free, but we don't eat it because we can't be 100% certain it isn't tainted with the deadly bacteria. We just don't trust the product. Same thing could occur with data on the Internet.
Terrorists trying to sabotage the Internet won't take it down; the Net is just too large and decentralized. But terrorists could tamper with a minute portion of the Internet to corrupt some key data sets--such as financial or medical records--so that the integrity of other sets of data would be compromised. "It doesn't have to be all the data corrupted to lead to a loss of confidence of all information we look at on the Internet," says Paul Kurtz, executive director of the Cyber Security Industry Alliance.
One bad apple--err, rotten bag of spinach or set of data--could spoil the whole bunch.
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024