Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

The big problem with bad cyber analogies

By Gentry Lane
cyber security freepik
July 16, 2021

Because cybersecurity events are complicated, we rely on analogies to understand how they work. Analogies are useful, but certain oversimplifications are perpetuating inaccurate narratives. These inaccuracies misdirect productive discussion and as a result, proposed policy and solutions are being based on faulty assumptions. A faulty premise can only yield flawed results…and cyber national security is not an area in which the United States has margin for error.

The nature of both print and broadcast media require big ideas to be distilled down to hot takes and pull quotes for quick and easy ingestion. An accurate analogous explanation is helpful when laid out by skilled subject matter experts. However, most prime-time political pundits and self-proclaimed cyber authorities lack novel technical or strategic insight. As a result, off-based discussion is happening daily at a national level further perpetuating and amplifying inaccuracies on this critical subject.

For example, reports of companies ‘hit by cyberattacks’ suggests that cyberweapons are similar to ICBMs: Precision weapons, delivered with hypersonic speed from a long-distance adversary, that inevitably resolve with breach and explosion. This is not at all how offensive cyberweapons work.

A more accurate analogy: Special force operations. Significant cybersecurity events are long, incremental operations executed in three phases: insertion (getting inside the target’s perimeter), reconnaissance (orientation and target exploration) and operations (mission objective execution). Mission objectives vary by target and adversary priority, and could include encrypting a network for ransom, exfiltrating data, building backdoors for later access, or any number of other tactics designed to degrade, disrupt, surveille, or sabotage a target. Each phase requires a few days to a few months to execute without being discovered. Advanced persistent threat (APT) cyber operations are targeted, coordinated and executed in specialized military or intel agency teams that are often based here in the United States. Without a basic understanding of adversary capabilities and intent, any subsequent discussion is irrelevant.

Attribution in the cyber domain is also grossly misunderstood. While cyber aggression is not visible in the traditional sense, they are by no means anonymous. Conclusive attribution, provenance and step-by-step details of security events are always available through an industry-standard digital forensic process. Stating (incorrectly) otherwise grants the adversary the stealth cover and plausible deniability that they, in fact, do not actually have.

The proverbial ‘Cyber Pearl Harbor’ is almost always used in the wrong context. The attack on Pearl Harbor was an important pretext for entering WWII, but no cyber event has caused a declaration of war. Pearl Harbor was the first military aggression that targeted the US homeland, but the current scale and persistence of nation-state cyber aggression on domestic critical assets is hardly comparable to bombing one Hawaiian port. On any given day, thousands of American companies are subject to disruptive cybersecurity events. Over 85% of critical infrastructure is in the private sector and investor-owned companies prioritize keeping security events out of public discourse in order to maintain trust in their brands. A true Cyber Pearl Harbor event is unlikely to be overtly known because the victim will exercise their right to privacy.

Words matter. Especially when they lead to panic buying, market fluctuations and executive orders. Instead of characterizing cybersecurity events as terrifying, sudden attacks by shady perpetrators, reframe the narrative with an accurate analogy: death by a thousand papercuts. The major threat actors are independently pursuing their national interests, but the cumulative effect of their combined efforts is an effective campaign of erosion to both American critical infrastructure and intelligent discourse.

Adversaries are beyond testing the DoD’s commitment to defend American assets in the cyber domain. They are instead deftly exploiting the conflicting authorities and civilian-sector distrust of federal law enforcement and intelligence agencies that leave the cyber homeland perpetually vulnerable. Focusing on strategy that disrupts or deters adversary operations rather than preventing an inevitable breach is a better line of discussion. Changing the adversary’s cost benefit calculus and shifting the tactical advantage to the defense is key, but it is rarely discussed even in erudite circles.  

Adjusting analogies to reflect reality more accurately will foster productive discourse toward viable solutions. A clear and common understanding of the threat is essential for designing a viable response. The resources and strategy required to defend against an ICMB strike would do nothing to stop or deter a special operations unit. The myopic focus on buzzword-laden, silver bullet solutions supported by inaccurate analogies are a detriment to U.S. national security.

KEYWORDS: cyber security information security national security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ms. Gentry Lane is the CEO and founder of ANOVA Intelligence, a computational defense technology company, visiting fellow at the National Security Institute, consultant at the Potomac Institute for Policy Studies, and internationally recognized cyberconflict strategy expert.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Hotel hallway

New Malware Campaign Targeting Hospitality Sector

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cyber Bad Guys Not After Big Guns Anymore

    See More
  • Person tapping AI app on phone

    Security isn’t convenient, and that’s a big problem in the age of AI

    See More
  • security-workforce-fp1170x658v8.jpg

    Fixing the cybersecurity workforce problem starts with us

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing