<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Cyber Warfare – Fear is the Real Threat</title>
	<atom:link href="http://www.gfi.com/blog/cyber-warfare-fear-real-threat/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-warfare-fear-real-threat</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-28623</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 07 Apr 2011 12:38:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-28623</guid>
		<description><![CDATA[@Bruce Personally I cannot think of any scenario in which such an action will ever be needed. Even in organizations that do not have skilled security personnel, in the case of an attack they will still easily be able to disconnect themselves from the Internet should it come to that; they don&#039;t require the whole country to block Internet for them. 

I can only assume that the reasoning behind such an idea is that if the country is under attack by a foreign country who have infiltrated key government/military infrastructure and are actively stealing confidential information and the victims aren&#039;t taking action (possibly because they have not realized the theft is occurring) a central government agency might be tasked with monitoring that no confidential data is being stolen, and therefore could hypothetically take swift action rather than having to contact the victims and mobilizing them to act. However, if this is indeed the case, it would still be an overkill. I would imagine that if they can detect such action, then they can block it too; no need for a wide net.]]></description>
		<content:encoded><![CDATA[<p>@Bruce Personally I cannot think of any scenario in which such an action will ever be needed. Even in organizations that do not have skilled security personnel, in the case of an attack they will still easily be able to disconnect themselves from the Internet should it come to that; they don&#8217;t require the whole country to block Internet for them. </p>
<p>I can only assume that the reasoning behind such an idea is that if the country is under attack by a foreign country who have infiltrated key government/military infrastructure and are actively stealing confidential information and the victims aren&#8217;t taking action (possibly because they have not realized the theft is occurring) a central government agency might be tasked with monitoring that no confidential data is being stolen, and therefore could hypothetically take swift action rather than having to contact the victims and mobilizing them to act. However, if this is indeed the case, it would still be an overkill. I would imagine that if they can detect such action, then they can block it too; no need for a wide net.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Bruce Roberts</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-26087</link>
		<dc:creator>Bruce Roberts</dc:creator>
		<pubDate>Thu, 17 Mar 2011 19:31:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-26087</guid>
		<description><![CDATA[The question is rather if there is no other alternative to the Internet kill switch. This is just too brutal - are we that powerless to need it? Or as Emmanuel Carabott points in the last comment: &quot;Disconnecting the US from the rest of the Internet provided it is indeed nationwide will, in my opinion, be more damaging then any attack.&quot; In other words, the use of this not-so-hypothetical kill switch will do more damage than hackers could inflict! This is simply ridiculous!]]></description>
		<content:encoded><![CDATA[<p>The question is rather if there is no other alternative to the Internet kill switch. This is just too brutal &#8211; are we that powerless to need it? Or as Emmanuel Carabott points in the last comment: &#8220;Disconnecting the US from the rest of the Internet provided it is indeed nationwide will, in my opinion, be more damaging then any attack.&#8221; In other words, the use of this not-so-hypothetical kill switch will do more damage than hackers could inflict! This is simply ridiculous!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17850</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 10 Jan 2011 10:08:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17850</guid>
		<description><![CDATA[@Cheryl - You&#039;re right it needs to be a balance. The importance here is perspective really. Cyber warfare for me is losing that perspective and taking the existent threats to a whole new level that is really not necessary. 

@Elbert Gelton - I agree. No one person / organization should have such power. The infrastructure should ultimately be able to defend itself. Personally I do not believe centralized intervention is needed. If some of the IT infrastructure is under attack it should be quite capable of defending itself even by cutting outside access if required. It should be the victim that controls the response to the attack however.

@Gary - I am not sure I can agree with you. You&#039;re right in that it&#039;s a defensive mechanism and not an offensive one or a retaliation, but I am not so sure that it prevents further damage. Obviously I don&#039;t know when such a system is going to be developed (if ever) but unless it&#039;s nationwide I doubt it will be effective. Disconnecting the US from the rest of the Internet provided it is indeed nationwide will, in my opinion, be more damaging then any attack. Furthermore it introduces a huge security risk in that anyone intent on disrupting IT operations in the US need only launch an attack to trick the victim into triggering the kill switch. In essence a clever attacker intended on disruption might achieve his goal by exploiting the country&#039;s response to an attack rather than depending on the success of an attack, which in most cases is pretty limited.]]></description>
		<content:encoded><![CDATA[<p>@Cheryl &#8211; You&#8217;re right it needs to be a balance. The importance here is perspective really. Cyber warfare for me is losing that perspective and taking the existent threats to a whole new level that is really not necessary. </p>
<p>@Elbert Gelton &#8211; I agree. No one person / organization should have such power. The infrastructure should ultimately be able to defend itself. Personally I do not believe centralized intervention is needed. If some of the IT infrastructure is under attack it should be quite capable of defending itself even by cutting outside access if required. It should be the victim that controls the response to the attack however.</p>
<p>@Gary &#8211; I am not sure I can agree with you. You&#8217;re right in that it&#8217;s a defensive mechanism and not an offensive one or a retaliation, but I am not so sure that it prevents further damage. Obviously I don&#8217;t know when such a system is going to be developed (if ever) but unless it&#8217;s nationwide I doubt it will be effective. Disconnecting the US from the rest of the Internet provided it is indeed nationwide will, in my opinion, be more damaging then any attack. Furthermore it introduces a huge security risk in that anyone intent on disrupting IT operations in the US need only launch an attack to trick the victim into triggering the kill switch. In essence a clever attacker intended on disruption might achieve his goal by exploiting the country&#8217;s response to an attack rather than depending on the success of an attack, which in most cases is pretty limited.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Gary</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17551</link>
		<dc:creator>Gary</dc:creator>
		<pubDate>Tue, 04 Jan 2011 22:11:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17551</guid>
		<description><![CDATA[@warren

I can understand the analogy, but I think comparing an internet kill switch to a nuclear warhead is a bit of an exaggeration. If you think about it, the purpose of an internet kill switch is to prevent further damage during a cyber attack on the nation’s online infrastructure. This manages to working functions intact while the attacker is kept at bay by other systems (which may or may not be physical). It isn’t an act of retaliation by any means. It’s simply a defensive mechanism.]]></description>
		<content:encoded><![CDATA[<p>@warren</p>
<p>I can understand the analogy, but I think comparing an internet kill switch to a nuclear warhead is a bit of an exaggeration. If you think about it, the purpose of an internet kill switch is to prevent further damage during a cyber attack on the nation’s online infrastructure. This manages to working functions intact while the attacker is kept at bay by other systems (which may or may not be physical). It isn’t an act of retaliation by any means. It’s simply a defensive mechanism.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Elbert Gelton</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17548</link>
		<dc:creator>Elbert Gelton</dc:creator>
		<pubDate>Tue, 04 Jan 2011 22:01:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17548</guid>
		<description><![CDATA[It’s hard to believe that over 61% of Americans approved of a single individual to have full control and authority on the internet. Whether he’s the local server maintenance guy or the President of the United States, I don’t believe any single individual should have access to that much power. Granted, it’s a measure for international security, but isn’t a bit ridiculous to be surrendering such blatant liberties for the sake of security?]]></description>
		<content:encoded><![CDATA[<p>It’s hard to believe that over 61% of Americans approved of a single individual to have full control and authority on the internet. Whether he’s the local server maintenance guy or the President of the United States, I don’t believe any single individual should have access to that much power. Granted, it’s a measure for international security, but isn’t a bit ridiculous to be surrendering such blatant liberties for the sake of security?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: cheryl</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17546</link>
		<dc:creator>cheryl</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:54:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17546</guid>
		<description><![CDATA[As cliché as it may sound, I do agree that fear is a real threat when it comes to any sort of far reaching endeavor (and in our case, security). Fear can prove to be both paralyzing and demoralizing, pushing us to take on security practices that may prove to be too drastic, impractical and in the end; highly ineffective. Although the fear of being attacked and exploited is a common motivation to be better secured, the motivation should neither be crippling or counterproductive.]]></description>
		<content:encoded><![CDATA[<p>As cliché as it may sound, I do agree that fear is a real threat when it comes to any sort of far reaching endeavor (and in our case, security). Fear can prove to be both paralyzing and demoralizing, pushing us to take on security practices that may prove to be too drastic, impractical and in the end; highly ineffective. Although the fear of being attacked and exploited is a common motivation to be better secured, the motivation should neither be crippling or counterproductive.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17459</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 03 Jan 2011 16:13:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17459</guid>
		<description><![CDATA[It certainly is a frightening concept and personally I am not so sure about its value either. Chances are by the time you know you need to use such a kill switch it will be too late and all you&#039;ll be doing is hindering yourself and your infrastructure. 

It depends how widespread such a kill switch will affect obviously but to be really effective I would imagine such a kill switch would need to isolate all of America from the rest of world. In terms of destructiveness it would probably be more then a nuclear warhead. At least it&#039;s environmentally better since flipping the switch back will at least get things back to normal without any harmful radiation lingering for years to come.]]></description>
		<content:encoded><![CDATA[<p>It certainly is a frightening concept and personally I am not so sure about its value either. Chances are by the time you know you need to use such a kill switch it will be too late and all you&#8217;ll be doing is hindering yourself and your infrastructure. </p>
<p>It depends how widespread such a kill switch will affect obviously but to be really effective I would imagine such a kill switch would need to isolate all of America from the rest of world. In terms of destructiveness it would probably be more then a nuclear warhead. At least it&#8217;s environmentally better since flipping the switch back will at least get things back to normal without any harmful radiation lingering for years to come.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: warren belowski</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17413</link>
		<dc:creator>warren belowski</dc:creator>
		<pubDate>Mon, 03 Jan 2011 00:36:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17413</guid>
		<description><![CDATA[Incredibly interesting tidbit about the president and his rumored “kill switch”. Although I can see the tangible security benefits of having a human-issued override for the internet in general, putting it under the sole power of a single individual (president or not) seems to be a frightening concept.  

Am I the only one getting the feeling that it’s like having access to a nuclear warhead, but this time, the only viable targets are completely online?]]></description>
		<content:encoded><![CDATA[<p>Incredibly interesting tidbit about the president and his rumored “kill switch”. Although I can see the tangible security benefits of having a human-issued override for the internet in general, putting it under the sole power of a single individual (president or not) seems to be a frightening concept.  </p>
<p>Am I the only one getting the feeling that it’s like having access to a nuclear warhead, but this time, the only viable targets are completely online?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jeremy Parker</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-17063</link>
		<dc:creator>Jeremy Parker</dc:creator>
		<pubDate>Tue, 28 Dec 2010 06:01:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-17063</guid>
		<description><![CDATA[I have to agree with Emmanuel about data sniffing being as old as data itself. The access to the proper tools to sniff out particular and critical points of data are now just a purchase away, if you know where to look. However, Patrick makes a good point about the boundaries of actual real-world warfare beginning to blur. However, I still think we’re leagues away from equating data theft with bombing a village.]]></description>
		<content:encoded><![CDATA[<p>I have to agree with Emmanuel about data sniffing being as old as data itself. The access to the proper tools to sniff out particular and critical points of data are now just a purchase away, if you know where to look. However, Patrick makes a good point about the boundaries of actual real-world warfare beginning to blur. However, I still think we’re leagues away from equating data theft with bombing a village.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/cyber-warfare-fear-real-threat/comment-page-1/#comment-16009</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 14 Dec 2010 18:14:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3013#comment-16009</guid>
		<description><![CDATA[I am not sure I agree Patrick. In the sense that data sniffing is not something that has just started to occur. Occasionally we hear stories, like the one when China redirected some 15% of the world traffic through its server potentially allowing it to spy on that traffic. Maybe it was a simple routing table error like they claim or maybe it was done intentionally. The problem is this is not something new; before this there was the Echelon project created in the 1960s to spy on Russia and subsequently used to monitor Internet traffic. It&#039;s allegedly run by Australia, Canada, New Zealand, the United Kingdom, and the United States and in the 1990s a controversy ensued because journalists claimed Echelon was being used for industrial espionage. Regardless, sniffing is a threat which every business faces, it doesn&#039;t need to be from powerful political entities or terrorists, it can be attempted by hackers, competitors or even your own employees. 

To cut it short, I think these are all attacks that one should already be protecting against regardless of terrorism.]]></description>
		<content:encoded><![CDATA[<p>I am not sure I agree Patrick. In the sense that data sniffing is not something that has just started to occur. Occasionally we hear stories, like the one when China redirected some 15% of the world traffic through its server potentially allowing it to spy on that traffic. Maybe it was a simple routing table error like they claim or maybe it was done intentionally. The problem is this is not something new; before this there was the Echelon project created in the 1960s to spy on Russia and subsequently used to monitor Internet traffic. It&#8217;s allegedly run by Australia, Canada, New Zealand, the United Kingdom, and the United States and in the 1990s a controversy ensued because journalists claimed Echelon was being used for industrial espionage. Regardless, sniffing is a threat which every business faces, it doesn&#8217;t need to be from powerful political entities or terrorists, it can be attempted by hackers, competitors or even your own employees. </p>
<p>To cut it short, I think these are all attacks that one should already be protecting against regardless of terrorism.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:13:23 by W3 Total Cache --