Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
New vulnerabilities are continually uncovered, and systems are configured or used in ways that make them open to attack.