ITMPI FLAT 005
Main Menu
Home / IT Governance / Cyber warfare: don’t inflate it, don’t underestimate it

Cyber warfare: don’t inflate it, don’t underestimate it

In this blog post, Mac Slocum interviews Jeffrey Carr the author of “Inside Cyber Warfare.” Carr answers questions regarding the major players, the hot spots, the huge problems, and the realistic solutions of Cyber warfare. Also included, is the one cyber warfare target that keeps him up at night. When asked to give somebody a firm sense of cyber warfare in five minutes or less he answered: I like the illustration of the introduction of the handgun. When Colt invented it, it became known as the great equalizer. So the way that the handgun revolutionized warfare is being done now, again. And it would be fair to call cyber warfare the great equalizer because it balances the scales between a vastly superior force and any nation. That's because of two things: the vulnerability of the current Internet and because most modern military forces are network-centric. The reliance on networks, particularly power networks, to conduct war is critical. Anybody who can attack the network can greatly inhibit a superior adversary. So I think that's a revolutionary step forward. When asked what the one thing is that keeps him up all night, Carr answered that most worrisome thing to him is the vulnerability of the power grid. He also states that the Department of Defense has identified 34 critical assets to conducting its mission and that 31 of those are dependent on the public power grid. This is a very insightful piece on a subject matter that many people consider a serious threat.

About Richard Wood

Richard Wood has been the publisher of CAI's Accelerating IT Success newsletter since its inception in 2011. A Marketing Major at Cal Poly Pomona he has been working with Computer Aid since 2001. He can be reached at richard_wood@compaid.com

Check Also

CSI Not Miami: How to Create a Culture of Improvement

While the abbreviation “CSI” may be more publicly associated with the string of cop procedurals …

Leave a Reply

Your email address will not be published. Required fields are marked *