• Please read the Announcement concerning missing posts from 10/8/25-10/15/25.
  • This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!

How are we going to protect our societies against cyber attacks? Latest victim The Colonial Pipeline

Indeed. It’s nice one of us will.
:ROFLMAO:
Dood...seriously...whatever damage I did to you...rub some ointment on it and quit hitting it. You'll feel better soon...I promise.
 

How are we going to protect our societies against cyber attacks? Latest victim The Colonial Pipeline​


You cannot, so long as humans are part of the equation.

Even if you had machines write the code, people would simply use other machines to break the code or find back-doors.

Good luck with that.
 
How are we going to protect our computer systems from cyber attacks when most of the components in our systems are manufactured by the country doing the attacking?
 
How are we going to protect our computer systems from cyber attacks when most of the components in our systems are manufactured by the country doing the attacking?

Where they are manufactured has nothing to do with it.

It has to do with the code -- the instructions -- which are written by humans.
 
Where they are manufactured has nothing to do with it.

It has to do with the code -- the instructions -- which are written by humans.

Hardware can have back doors ALREADY built in, usually with installed firmware that can be accessed. That chip you just bought is not "blank". It has firmware already installed.

It’s called a hardware backdoor, and it’s a lot like a software virus that grants backdoor access to your computer — but the code resides in the firmware of a computer chip. In short, firmware is software that is stored in non-volatile memory on a computer chip, and is used to initialize a piece of hardware’s functionality. In a PC, the BIOS is the most common example of firmware — but in the case of wireless routers, a whole Linux operating system is stored in firmware.
 
You cannot, so long as humans are part of the equation.

Even if you had machines write the code, people would simply use other machines to break the code or find back-doors.

Good luck with that.
What about my suggestion to close those systems from Internet? It isn't like it didn't exist before internet, so it would be doable. I don't mean close them from internal communication , just build internal nets instead of using internet.
 
What about my suggestion to close those systems from Internet?

Then they wouldn't work. If --by removing them from the internet -- you mean go back to the old way of doing things, sure you could do that in theory, but not in reality, because you don't have the labor.

There's also the issue of price.

People are whining now that gasoline is $3/gallon, so will we all drown in their tears when gasoline is permanently $4/gallon and higher?


It isn't like it didn't exist before internet, so it would be doable. I don't mean close them from internal communication , just build internal nets instead of using internet.

Internal networks can be hacked, too.

To have an internal network, every link in the chain would have to be isolated from the internet, and that's both problematic and costly, because basically you'd need a totally independent internet.

That would be cost-prohibitive and still not fool-proof.

Also, I don't think you understand that pipelines have both electronic pumps and electronic valves. They're not actually hooked into the internet, You control them with radio, broadband or satellite (basically same as broadband).

So, I'm in Texas monitoring a valve-pump-valve combo in Ohio, or maybe the pipeline splits so it's valve-pump-valve-valve. I know what they're doing, because they broadcast a radio signal to a tower that goes across the internet, or in really remote areas, it'll broadcast to a satellite.
 
Back
Top Bottom