Submit your comments on this article |
Home Front: WoT |
The Next Wave of Cyberattacks Won't Steal Data ‐ They'll Change It |
2015-09-11 |
... "Most of the public discussion regarding cyber threats has focused on the confidentiality and availability of information; cyber espionage undermines confidentiality, whereas denial of service operations and data deletion attacks undermine availability," he wrote. "In the future, however, we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e., accuracy and reliability) instead of deleting it or disrupting access to it." The bottom line, Clapper says: "Decision making by senior government officials (civilian and military), corporate executives, investors, or others will be impaired if they cannot trust the information they are receiving." ... |
Posted by:Blossom Unains5562 |
#7 ..oh, the VA gambit. |
Posted by: Procopius2k 2015-09-11 14:45 |
#6 Wholesale change of personal medical file status to 'healthy', showing how well our new 'National Health Service' is doing. |
Posted by: Mullah Richard 2015-09-11 14:41 |
#5 Back to hardcopy. |
Posted by: g(r)omgoru 2015-09-11 10:32 |
#4 Backups. Checksums. File permissions (much more restrictive then for reading). Selinux and similar (a program cannot access what it has not business to accede even when run by system administrator). Peripherals/partitions in read-only mode. Unmutable files. |
Posted by: JFM 2015-09-11 08:24 |
#3 How many things found or not found on servers or computers have been outside plants or actions? If you demand a legal trail of receipts of evidence to make sure such has not been tampered or altered, how can you validate the same of PC et al? |
Posted by: Procopius2k 2015-09-11 07:55 |
#2 "Next"? |
Posted by: Skidmark 2015-09-11 01:52 |
#1 I can't get this picture of Johnny Dangerously changing his math grades out of my head. |
Posted by: Shart Snotle7743 2015-09-11 00:45 |