heada
Well-Known Member
Proper IT security is made up of 3 parts
1) something you know
2) something you have
3) something you are
To get into my data center, I have to have my badge, I have to know my PIN and I have to have my eyes (retinal scanner at all doors). Our network security is similar except that the "something you are" is very hard to do so they add the SecurID part. I have to know my user ID and password, I have to be on a company device (with company installed certificates) and I have to have my SecurID token.
And for EMPs, the risk is over-blown I think. Since EM has to obey the inverse square rule, in order to take out all of the US, you'd need so many EMP devices it'd be unworkable. Putting them in key locations at key times could be done to take out some critical infrastructure. Take out a few key power substations in the middle of high usage times and you could take out the entire power grid (see Texas this past winter)
1) something you know
2) something you have
3) something you are
To get into my data center, I have to have my badge, I have to know my PIN and I have to have my eyes (retinal scanner at all doors). Our network security is similar except that the "something you are" is very hard to do so they add the SecurID part. I have to know my user ID and password, I have to be on a company device (with company installed certificates) and I have to have my SecurID token.
And for EMPs, the risk is over-blown I think. Since EM has to obey the inverse square rule, in order to take out all of the US, you'd need so many EMP devices it'd be unworkable. Putting them in key locations at key times could be done to take out some critical infrastructure. Take out a few key power substations in the middle of high usage times and you could take out the entire power grid (see Texas this past winter)