PaulDotCom mailing list archives

Warfare all over


From: arch3angel at gmail.com (Arch Angel)
Date: Fri, 2 Jan 2009 10:18:08 -0500

WOW, it really is great to read all these comments.  While I first expected
to explain the reasoning and my personal thoughts on why "warfare" is a bad
term in general to use, Jack and Jim have really step up to the plate and
hit some great home runs.

If it's ok with you Jim I would like to tuck your two statements away with
Jack's, I think some good things can come out of this.  While I explain the
reason these terms have become so widely used, and my thoughts on the matter
at hand, the two of you have really brought in perfect comments against the
use of these terms.

I say we start a thread sticky somewhere and paste my general "this is the
crappy reason the terms are used" and then post up these four comments
stating solid reasons why these terms fail miserably in the description of
Information Security.

I, by no means, want to take away from Daniel's original question or imply
anything against him.  I just think that his question spawned a great string
of ideas and comments.  Even I have pondered why on Earth people are taking
terms and actions from one context and placing them in others, and I think
there is a huge number of others who have pondered this same matter over and
over.  While the mailing list is great for things such as this, I fear that
in the vacuum of email storage the true benefit will be lost.  It's just not
likely that a new member to the mailing list will receive or even ask for
this email chain, if the topic and its responses are placed into a sticky on
the forum it will be open for all to see, minus actual email addresses of
course.  I just believe more people in this world are thinking this exact
same thing but never bother to ask. :-(

Robert

I agree. The whole concept of warfare extends well beyond the battlefield
but your typical infosec incident wouldn't even register as a skirmish.
Warfare is too often a "sexy" term used to spice up a subject..

A better analogy I feel is that of crime V law enforcement. Infosec
incidents are usually criminal so the analogy fits, along with anti-criminal
measures such as locks on doors, entry/exit auditing, strong authentication
etc. Let's not give the other side a cool, sexy profile al la the whole
piracy issue. Criminal scumbags are the ones attacking us, not spies,
soldiers, insurgents and terrorists (on the whole).

Jim

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20090102/d94f4e09/attachment.htm 


Current thread: