Home / News

Cyberattacks Will Be Disruptive, Not Destructive, Says Howard Schmidt

In a recent interview by Krish Raghav, from Wall Street Journal's LiveMint.com, Howard Schmidt, an information networks expert and a senior cyber-security adviser in the Bush administration, talked about several hot Internet issues, including net neutrality and cyber-attacks. In this report, Raghav starts with the following statement: "In the last 12 months, some 10 Indian government ministry websites have been targets of cyber-attacks. Recently, security experts with Boston-based Core Security Technologies said such attackers could "gain control
of countries' water treatment plants, natural gas pipelines and other critical utilities".

In response to whether cyber-attacks could have the same impact as 9/11 in the U.S., Schmidt responded: "The way I try to answer this, is that we tend to look at cyber attacks as 'disruptive,' and not 'destructive.' We think of some regions in the world that have dependence on ICTs — whether its power systems or transport. But these critical systems are built in a way to ensure only 'disruption' and not 'destruction.' We've come a long way in, and today we are able to identify attacks early, mitigate it quickly and recover from it fast as well."

Read full story: External Source

By CircleID Reporter – CircleID's internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us. Visit Page

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

 Be the first to post a comment!

Add Your Comments

 To post your comments, please login or create an account.

Related

Topics

DNS Security

Sponsored byAfilias

New TLDs

Sponsored byAfilias

Cybercrime

Sponsored byThreat Intelligence Platform

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byAppdetex

Whois

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign