Responses: 31
Until we completely disable Internet surfing, except for .mil and .gov websites, there's always going to be a risk no matter how stringent measures we take.
A plausible start though would be to let those charged with the cyber security of our networks actually do their jobs, and give better training to the systems and network administrators.
A plausible start though would be to let those charged with the cyber security of our networks actually do their jobs, and give better training to the systems and network administrators.
(2)
(0)
I say we go to the source and screw up their networks!
Cyberwars are a reality, and we best get our sh*t together, before they hit our infrastructure via networks.
If that happens, we've only got ourselves to blame.
Computers were created in America, by Americans, and yet some third world weenie can circumvent our security protocols? Our guys must be dense!
Cyberwars are a reality, and we best get our sh*t together, before they hit our infrastructure via networks.
If that happens, we've only got ourselves to blame.
Computers were created in America, by Americans, and yet some third world weenie can circumvent our security protocols? Our guys must be dense!
(2)
(0)
Would really like to see Direct Action Raids against hackers, especially where host governments are unwilling or unable to deter them. Would also like to see financial action taken against their backers and benefactors. Nothing says punitive quite like dudes with beards fast roping into a Hacker's (Mom's Basement) house, snatching him up in flex cuffs, exploiting all their stuff.
I am on a .mil network with a CAC, how would a strong password do anything more? Strength of password is at direct odds with ass-pain of entering it correctly, remembering it, and relative anemia of it against a key stroke stealing virus.
I am on a .mil network with a CAC, how would a strong password do anything more? Strength of password is at direct odds with ass-pain of entering it correctly, remembering it, and relative anemia of it against a key stroke stealing virus.
(2)
(0)
I had to choose the best option. There will always be the threat of an attack getting through because tech is constantly getting better. Cyber security is a cat and mouse game. You build your security, & they keep at it until they crack it, making you build better security.
(2)
(0)
SSG Lloyd Becker BSBA-HCM, MBA
This was a proposed dissertation of mine when I was in the doctorate program. Mine was not computer science, it was healthcare management.
I have been saying all along that the best security is to disconnect the computer from the internet and return to paper. True, there are always spies, but spies are easily more handled when they are in range of someone grabbing them.
Just like during the Clinton Administration when our nuclear warhead technology was stolen by the Chinese who was cleared to work in a secured area. Compliments of Clinton himself.
If we have something that requires security with computers, put them behind locked doors, inaccessible to the internet. No lunchboxes and no traveling coffee cups. Glass or paper cups are allowed in the secured room. Metal detectors or high energy magnets that are at the entrance to the room. High energy magnets will destroy the capabilities of any flash drives and no CDs. And, any worker has no idea where those magnets are at.
People are to sign in and sign out. No one has keys to the secured room. One guard on duty at all times and the guard is the only one who can open the door. Also, the door can freely be opened from the inside so the worker can leave and they will undergo a 100% inspection.
This is only the beginning.
I have been saying all along that the best security is to disconnect the computer from the internet and return to paper. True, there are always spies, but spies are easily more handled when they are in range of someone grabbing them.
Just like during the Clinton Administration when our nuclear warhead technology was stolen by the Chinese who was cleared to work in a secured area. Compliments of Clinton himself.
If we have something that requires security with computers, put them behind locked doors, inaccessible to the internet. No lunchboxes and no traveling coffee cups. Glass or paper cups are allowed in the secured room. Metal detectors or high energy magnets that are at the entrance to the room. High energy magnets will destroy the capabilities of any flash drives and no CDs. And, any worker has no idea where those magnets are at.
People are to sign in and sign out. No one has keys to the secured room. One guard on duty at all times and the guard is the only one who can open the door. Also, the door can freely be opened from the inside so the worker can leave and they will undergo a 100% inspection.
This is only the beginning.
(1)
(0)
SSgt (Join to see)
I agree, SSG Lloyd Becker BSBA-HCM, MBA. The only true way to secure a computer system is to have it on an intranet system - no outside lines or connections other than the outlet it is plugged into for electricity. I think that sensitive material should still be stored on hard copy, locked away & guarded. I mean, computer security programs find hackers & pay them ginormous amounts of money to crack their system so that they can build a better system.
(0)
(0)
IMO they need to cough up the money and get the very best IT people to defend against attacks.
(1)
(0)
Perhaps we should realize that the US invented the internet and give the CIC buttons to turn it off in places that take efforts to attack us. We have the smarts to construct the thing, we should have the ability to craft the routing tables.
It may have diplomatic, economic and political fall-outs but it would definitely send a message if used conservatively.
It may have diplomatic, economic and political fall-outs but it would definitely send a message if used conservatively.
(1)
(0)
The best option is paying China to hack for us rather than against us. Hell, every other U.S. business is outsourcing.
(1)
(0)
Clearly they should prosecute where possible, and they should retaliate against those not within our legal grasp.
(1)
(0)
Read This Next

Hacking
Cyber
Security
