This is why we need Black ICE* on government systems; active firewalls that check for authorization of any system connecting, and if no such authorization is found, a backtrace and all-out counterattack, designed to completely disable the attacker, is automatically launched. Bonus points if it can cause physical damage to the attacking system(s), like some copy-protection schemes did to the Commodore 64 floppy drives..
ICE: Intrusion Control Electronics
With so much of the world connected to the internet. It is important that they consider "cyberspace" another front. Hackers could easily take down something like the electrical grid to disrupt operations.
NEWS TIPS |
This site is intended for informational and entertainment purposes only. The contents are the views and opinion of the author and/or hisassociates. All products and trademarks are the property of their respective owners. All content and graphical elements areCopyright © 1999 - 2014 David Altavilla and HotHardware.com, LLC. All rights reserved. Privacy and Terms