Possible Futures in Cyber Warfare

With the ever-increasing threat of a concentrated cyber attack on the U.S., government officials have been trying to think of new ways to battle its growing menace. According to some, just bolstering the infrastructure we already have will not work in the long run. The computer, and its programming, might require a complete redesign. This could seem like a daunting task to some, but now is the best time to institute a redesign as the computer world switches over from desktops and office networks to more mobile forms of connecting through the Internet. And while such a redesign is probably not going to happen anytime soon, there are those who are looking at the issue with an eye to doing just that, according to www.nytimes.com.

Called a “Clean Slate” approach, two groups have been created by the Pentagon’s Defense Advanced Research Projects Agency (DARPA) to come up with new ways and new computer and programming designs to answer the call for improved Internet and computer security. The program includes two efforts that are attempting to answer the question, “If the computer industry got a do-over, what should it do differently?”

The groups are: CRASH, which stands for Clean-Slate Design of Resilient Adaptive Secure Hosts, and MRC, or Mission-Oriented Resilient Clouds. Their job is to look at current computing entirely, from computer design to the programs that make them work, and create ways in which both areas can be developed to provide more security and protection from hackers and other threats to the data our computers contain.

One of the primary ways that this goal could be accomplished is to make computer software in a constant state of change, shape shifting to elude anyone trying to gain access for malicious means. What is also being considered is taking a lesson from biology and adopting multiple protective measures, much like the human body does against disease.

The main issue might not be exactly about designing new ways to protect sensitive systems and information, but instead in getting society to adopt such innovations as a whole. It does no good to come up with more stringent and effective security measures if no one uses them. That will be the biggest hurdle — getting companies and individuals onboard in the continuing fight against hackers and state sponsored cyber terrorist.

For more information about cybersecurity efforts, visit: http://www.nytimes.com/2012/10/30/science/rethinking-the-computer-at-80.html?pagewanted=all