Spinach Woes Portend Repercussions Of Cyberattack

Wonder what the aftereffect of a terrorist attack on the Internet would look like? The way we're responding to contaminated spinach provides a clue.

Dark Reading Staff, Dark Reading

September 19, 2006

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Wonder what the aftereffect of a terrorist attack on the Internet would look like? The way we're responding to contaminated spinach provides a clue.Nearly every bag of spinach in the United States is E. coli-free, but we don't eat it because we can't be 100% certain it isn't tainted with the deadly bacteria. We just don't trust the product. Same thing could occur with data on the Internet.

Terrorists trying to sabotage the Internet won't take it down; the Net is just too large and decentralized. But terrorists could tamper with a minute portion of the Internet to corrupt some key data sets--such as financial or medical records--so that the integrity of other sets of data would be compromised. "It doesn't have to be all the data corrupted to lead to a loss of confidence of all information we look at on the Internet," says Paul Kurtz, executive director of the Cyber Security Industry Alliance.

One bad apple--err, rotten bag of spinach or set of data--could spoil the whole bunch.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights