Posted on May 10, 2021
Colonial hack: How did cyber-attackers shut off pipeline?
783
4
1
3
3
0
Posted >1 y ago
Responses: 1
...and what do we do when they start killing people (our people) as a consequence of their extortion attempt?
We first need to view it as an overt act of war launched by gang of extortionists, a cartel or a sovereign government. The consequence for perpetuating this “Act of War” should be hyper severe with enhancements for not the damage done, but rather for the maximum potential-damage that could be done. No bystanders in this process… choose your side.
In terms of cyber defense, we have clever coders too. For our own side of the board, until we have the eternally-fictional bullet proof firewall, EVERYTHING is vetted crossing the air gap. Let the Trojan Horse graze at the OK Corral.
We first need to view it as an overt act of war launched by gang of extortionists, a cartel or a sovereign government. The consequence for perpetuating this “Act of War” should be hyper severe with enhancements for not the damage done, but rather for the maximum potential-damage that could be done. No bystanders in this process… choose your side.
In terms of cyber defense, we have clever coders too. For our own side of the board, until we have the eternally-fictional bullet proof firewall, EVERYTHING is vetted crossing the air gap. Let the Trojan Horse graze at the OK Corral.
(0)
(0)
Read This Next