Tuesday, November 17, 2009
US engaging in offensive as well as defensive cyberwar | Tweet |
Nextgov has published a very insightful piece on the US's cyberwar endeavours, including their use of it as an offensive tool to locate and knock out the organisational capabilities of their enemies and even kill foes.
The article, The cyberwar plan, not just a defensive game, also covers the Russian attacks on Estonia and Georgia and China's use of cyberwarfare techniques to gain economic advantage over foreigners (I also continue wondering about the attack on the Melbourne Film Festival earlier this year).
It's a very well-researched piece and provides a lot of food for thought.
Given that most wealth and knowledge is stored electronically and most organisation is done via digital channels, the impact of a successful attack on our communications systems or finance sector would be catastrophic to our economy and potentially to our ability to cope with a physical attack.
Australia's defense force has traditionally been very quiet about a domestic cyberwar capability and I wonder whether we are adequately defended and able to respond to attacks on Australia's digital sovereignty.
The article, The cyberwar plan, not just a defensive game, also covers the Russian attacks on Estonia and Georgia and China's use of cyberwarfare techniques to gain economic advantage over foreigners (I also continue wondering about the attack on the Melbourne Film Festival earlier this year).
It's a very well-researched piece and provides a lot of food for thought.
Given that most wealth and knowledge is stored electronically and most organisation is done via digital channels, the impact of a successful attack on our communications systems or finance sector would be catastrophic to our economy and potentially to our ability to cope with a physical attack.
Australia's defense force has traditionally been very quiet about a domestic cyberwar capability and I wonder whether we are adequately defended and able to respond to attacks on Australia's digital sovereignty.
Tags:
case study,
gov20,
innovation,
leadership,
security,
strategy,
technology
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.