PaulDotCom mailing list archives
Warfare all over
From: arch3angel at gmail.com (Arch Angel)
Date: Fri, 2 Jan 2009 10:18:08 -0500
WOW, it really is great to read all these comments. While I first expected to explain the reasoning and my personal thoughts on why "warfare" is a bad term in general to use, Jack and Jim have really step up to the plate and hit some great home runs. If it's ok with you Jim I would like to tuck your two statements away with Jack's, I think some good things can come out of this. While I explain the reason these terms have become so widely used, and my thoughts on the matter at hand, the two of you have really brought in perfect comments against the use of these terms. I say we start a thread sticky somewhere and paste my general "this is the crappy reason the terms are used" and then post up these four comments stating solid reasons why these terms fail miserably in the description of Information Security. I, by no means, want to take away from Daniel's original question or imply anything against him. I just think that his question spawned a great string of ideas and comments. Even I have pondered why on Earth people are taking terms and actions from one context and placing them in others, and I think there is a huge number of others who have pondered this same matter over and over. While the mailing list is great for things such as this, I fear that in the vacuum of email storage the true benefit will be lost. It's just not likely that a new member to the mailing list will receive or even ask for this email chain, if the topic and its responses are placed into a sticky on the forum it will be open for all to see, minus actual email addresses of course. I just believe more people in this world are thinking this exact same thing but never bother to ask. :-( Robert I agree. The whole concept of warfare extends well beyond the battlefield
but your typical infosec incident wouldn't even register as a skirmish. Warfare is too often a "sexy" term used to spice up a subject.. A better analogy I feel is that of crime V law enforcement. Infosec incidents are usually criminal so the analogy fits, along with anti-criminal measures such as locks on doors, entry/exit auditing, strong authentication etc. Let's not give the other side a cool, sexy profile al la the whole piracy issue. Criminal scumbags are the ones attacking us, not spies, soldiers, insurgents and terrorists (on the whole). Jim _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
-------------- next part -------------- An HTML attachment was scrubbed... URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20090102/d94f4e09/attachment.htm
Current thread:
- Warfare all over Jack Daniel (Jan 01)
- Warfare all over Arch Angel (Jan 01)
- Warfare all over Mike Patterson (Jan 01)
- Warfare all over Jim Halfpenny (Jan 02)
- Warfare all over Arch Angel (Jan 02)
- Warfare all over Mike Patterson (Jan 02)
- Warfare all over Matt Hillman (Jan 03)
- Warfare all over Karl Schuttler (Jan 03)
- Warfare all over Matt Lye (Jan 04)
- Warfare all over Arch Angel (Jan 02)
- <Possible follow-ups>
- Warfare all over johnemiller at gmail.com (Jan 02)