How to save your country from cyberterrorism?

This is cyberterrorism that what how can be called the events taking
place in the world today. In the last year alone, terrorist hacker groups
have damaged or disabled critical social facilities in the United States.
Energy, industrial, social, medical, police facilities. Transport - aircraft
was attacked, in Germany there were recorded cases of death of hospital
patients as a result of cyber terror. The goal of this wave of cyber
violence is one - to kill as many people as possible. Why did all this
become possible? So let's talk about it.
Western societies have abandoned the cyber-technology model in favor
of the marginal bubble of the Nasdaq IT cartels, created by con artist
Bernard Lawrence Madoff. The technologies offered by Nasdaq are
quick-fix consumer solutions. So that investors can speculate in stocks.
But these technologies have never been suitable for critical infrastructure
facilities. Because modern software products are shitcode created from
external libraries and frameworks. And unlike classical programming
languages, they are just a heap of scripts. Such solutions are good for
building a "new socialism" because they allow data to be stolen and sold.
In other words, speculating on the stupidity of idiots. And of course, the
open architecture of networks and shit applications opens the way for cyber
terrorists to the very heart of America, not to mention other countries.
Previously, in the good old days, there was no single network. In the United
States, there were many closed scientific, military, government networks.
Sometimes not connected to each other. Lone hackers, often with internal
access, have been able to hack into these networks, or at least know about
them. No cyber terrorists in the 1980s would have been able to gain access
to General Motors networks, oil pipelines, hospitals, police stations.
Because each network had its own standard and its own communication
technology. Until the early 1990s, critical infrastructure remained
inaccessible to a cyber-terrorist invasion. Why?
The first and most important element of security in those years was the
lack of access to networks from outside. The second important criterion,
such networks were controlled using computers of the 3rd generation. The
most famous of computer today is the PDP-11. The third criterion is unique
programs developed by scientists in laboratories, not speculators on the
stock exchange. Unique technical solutions ones cannot be hacked by
someone from the outside, because they are produced in single copies.
The fourth criterion for network security in the 70s and 80s was the use
of programmable calculators as industrial controllers. None of these
hardware solutions can be invisibly infected with a virus. After all, many
computers had hardware control over data changes.
Today, for the purposes of national security, any country can restore the
structure and scientific operation of third-generation computer networks.
Classic magnetic tape can be replaced with modern holographic or nano film.
Restore serial production of programmable calculators, PDP-11 and terminal
clients, and old communication standards based on assembler, C, Fortran,
Cobol and so on. It can be argued that nations that are not associated with IT
cartels at the infrastructure level have a greater advantage today, since they
are not vulnerable to cyber terrorism, virus outbreaks, and so on. That allows
to save huge amounts of money on license fees. Experts are frankly tired of
the tyranny of corporate managers who constantly deceive customers in terms
of security. Therefore, against this background, even a minimally automated
model of enterprise administration based on paper document flow
(cards and forms) shows the possibilities of a real mechanism for saving money
and protecting information.
At the same time, a number of indisputable advantages are obvious. In addition
to the fact that the data is stored in formats that are exotic for modern
hackers, they are also difficult to access from outside. And this is not to
mention the lack of opportunities for operators to be distracted by social
networks and other irritants for salivation.
The truth is, after the creation of the Nasdaq and the collapse of the dot.com
bubble, we forgot that consumer needs and national security needs are not the
same thing. It is necessary to clearly distinguish between military, political,
social and consumption issues. Never before in the entire history of the
post-World War II era has the West been so transparent, helpless and
vulnerable to cyber terrorism as it is today.