Computerworld - A research paper released last month by the Center for Strategic & International Studies (CSIS), a Washington-based think tank, argues that computer networks and critical infrastructures are distinct entities and that the threat from cyberterrorism is far less serious than the government and the media contend.
"The assumption of vulnerability is wrong," argues James A. Lewis, a CSIS analyst and author of "Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats."
"While many computer networks remain very vulnerable to attack, few critical infrastructures are equally vulnerable," according to Lewis. "Computer network vulnerabilities are an increasingly serious business problem, but their threat to national security is overstated."
But Lewis offers few examples and technical details to support his claims, which stand in stark contrast to much of the new thinking by high-level national security experts on the issue of critical infrastructure protection and cybersecurity.
In a recent interview with Computerworld, for example, Brenton Greene, deputy director of the National Communications System, an executive-branch agency responsible for maintaining and restoring communications during times of national crisis, said the physical and cyber aspects of critical-infrastructure protection can't be separated. Major physical events will have digital ramifications and vice versa, said Greene.
That's also the conclusion of the recently released annual report of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, led by former Virginia Gov. James S. Gilmore (see story). "Cyberspace has been isolated and specialized, thus limiting its perceived relevance to day-to-day outcomes and even its relevance to what are viewed as clear and present homeland security threats," the commission stated.
In an interview, Gilmore said the commission's studies show that cyberterrorism is a clear and present danger to critical infrastructure.
"The information technology, Internet and computer world that we now live in is vulnerable, and it must be analyzed together with other physical parts of critical infrastructure in order to protect the nation," he said.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Cybercrime and Hacking White Papers | Webcasts