It may be a good plan if there are backups in case you get hacked.
It may be a good plan if there are backups in case you get hacked.
There are always backups. Not having a backup creates a key vulnerability.
Not sure what you mean by backups in this context.
The obvious downside to every node having knowledge of every other node is that you only need to hack one device in the network.
Seems like a fundamentally risky approach. I would want my enemy to implement something like this for the opportunity it would provide.
Anyone else read the article about the key logging malware they can’t get rid of at Creech AFB?
yea well I hope they maintain a ‘sneaker net’ work too. Being technologically dependent give you a single point of failure. Add each branch becoming technologically dependant upon each other and it will look like the Maginot line.
Exactly. I can see future battles where a major effort will be made to break into the info system and feed false information to headquarters and send false orders to soldiers. A powerful battle information system can become the Achilles heel of an army.