Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to the civilized world continue to be attacks on global infrastructure, connected devices, command and control systems, SCADA, etc. We would be remiss if we do not continue to harden our defenses and teach our citizens how to protect themselves. ~GhostSecGroup

The Target is the Economy, Which Depends on Technology
In military parlance, a vulnerability that, when properly exploited, decides a conflict is called a Center of Gravity. With the ever further increasing inter-operability of every military unit, from a tank battalion to a carrier strike group and upwards, becoming a reality, IT-based command and control systems are perhaps the closest incarnation of a perfect Center of Gravity that ever existed. Given the world’s (and especially the West’s) rapidly increasing dependence on IT for its organizations to function, cyber operations move from the fringes to the very center of future warfare.

Read the full article here: Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare – Security Boulevard

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.