![]() ![]() ![]() And with it come the same vulnerabilities, poor digital hygiene, and human errors that make land-based systems open for attack. Take that battle 20,000 kilometers (12,000 miles) into space where satellites roam and you have the final frontier of cybersecurity. That struggle started half a century ago with audio tapes and floppy discs the primary weapon, before faster wired and mobile communications allowed an adversary to breach a target’s network to steal credit card information or shut down oil pipelines. For decades, IT administrators have waged an endless war to protect their systems from hackers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |