SEADE: Countering the Futility of Network Security
AIR AND SPACE POWER JOURNAL MAXWELL AFB AL
Pagination or Media Count:
Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords e.g., default value, simple number strings, or the word password itself. Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access.
- Computer Systems Management and Standards