Information Warfare: October 7, 2002

Archives

Military and government cyberwarriors have, collectively, made several startling discoveries in the last year or so. First has come the realization that not much progress is being made to protect government and military networks using the traditional methods (of asking Congress for more money, trying to train more military network technicians or hiring more civilian consultants.) Then came the fact that about 20 of the hundreds of network vulnerabilities (poorly written software that lets hackers get inside other people's computers) are responsible for about 80 percent of the hacker attacks. The conclusion from these two items was that, we will get a lot more protection for our money if we go after the top 20 vulnerabilities. This list, like a best seller list, changes slightly from month to month, so you'll always be busy, but you'll always be blocking the easiest way in. Attempts to fix larger number of vulnerabilities tend to overwhelm the undermanned government and military Internet support staffs. As the old battlefield maxim goes, "he who tries to defend everything, defends nothing."

 

X

ad

Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contribute. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   contribute   Close