Home / Blogs

Ending Cyber-Hubris

Hurricane Katrina will lead the endless finger pointing about what should have been done to strengthen the levees before the storm. However, as a former senior FEMA official under the Clinton Administration explained, "There's only two kinds of levees. Ones that have failed and those that will fail." The same is true for cyber-levees.

The internet today is in the same position as New Orleans was before the hurricane, a heavily fortified resource of incalculable economic and cultural value whose protections will one day inevitably fail.

The above observation does not mean that there should be any slackening of efforts by all stakeholders to continue strengthening cybersecurity protections. Governments, industry, academia, and individual computer users will always need to take vigorous measures to protect the internet. However, everyone should realize that there are limits and fallibilities to even the mightiest efforts.

Not only are there limits to how far we can go in securing the internet, there should be limits. After all, the most secure computer is one that is unplugged. Enjoying the social and economic benefits of the internet also inherently means accepting and learning to manage risk.

Just as the world was shocked by the devastation of New Orleans, a scenario that has been predicted for decades, so to will the globe be staggered by the failure of the internet. There are still many people and institutions who don't appreciate just how intertwined the internet has become in virtually every aspect of modern society.

New Orleans will eventually be rebuilt in some form. The internet will most likely be repaired much more quickly. However, the consequences of each failure will reverberate long after working infrastructures have been restored.

What is needed is not just to protect the internet but also to prepare for the time when those protections fail. 

By Bruce Levinson, SVP, Regulatory Intervention - Center for Regulatory Effectiveness
Follow CircleID on
Related topics: Cybersecurity
SHARE THIS POST

If you are pressed for time ...

... this is for you. More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Vinton Cerf, Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Share your comments

To post comments, please login or create an account.

Related

Topics

DNS Security

Sponsored byAfilias

Cybercrime

Sponsored byThreat Intelligence Platform

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byAfilias

IP Addressing

Sponsored byAvenue4 LLC

Whois

Sponsored byWhoisXML API

Brand Protection

Sponsored byAppDetex

Cybersecurity

Sponsored byVerisign