"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
Homeland Security Secretary Janet Napolitano says the government will fully deploy the Einstein 2 threat detection system by year's end and will begin implementing in 2011 Einstein 3, with the aim to automatically detect and disrupt malicious cyber activity.
The evolution of IT security requires human ingenuity. Machines are fast but dumb, yet using human brainpower can help reject quickly harmful traffic aimed to damage critical IT systems, says Phyllis Schneck, McAfee CTO/public sector.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
"Signatures are not going to be the way of the future because we don't have time to put a name or a pattern on enemy behaviors and pass it out and block it," says Phyllis Schneck, McAfee chief technology officer/public sector.
"We're asking those providers to meet our requirements, not the other way around," Michigan CIO Kenneth Theis says, referring to a cloud-computing framework that, in part, defines the security features the state demands its vendors to furnish.
Despite efforts to tighten security to prevent such digital invasions, the military understands such breaches could still occur, which led Lynn to say the military must develop and train its cyber defenders to act in a degraded information environment.
"Any conflict we see going forward is going to have some element of cyber warfare and we need to make sure that we've prepared and developed our military capabilities to sustain that," says Defense Deputy Secretary William Lynn III.
Defense Deputy Secretary William Lynn III briefs the media on the Department of Defense's new strategy to defend military IT networks and a 2008 incident in which an assailant breached a classified military network.