TY - CHAP
T1 - Computing in compromised environments
T2 - Beyond the castle model of cyber-security
AU - Skillicorn, David
AU - Leuprecht, Christian
AU - Tait, Victoria
N1 - Includes bibliographical references.
PY - 2016
Y1 - 2016
N2 - The predominant metaphor for secure computing today is defence in depth: higher, better layers of walls. This article explains why that approach is as outmoded for cybersecurity today as it became for physical security centuries ago. Three forces are undermining the castle model as a practical security solution. First, organizations themselves tear down their walls and make their gateways more porous because it pays off in terms of better agility and responsiveness—they can do more, faster and better. Second, technological developments increasingly destroy walls from the outside as computation becomes cheaper for attackers, and the implementation of virtual walls and gateways becomes more complex, and so contains more vulnerabilities to be exploited by the clever and unscrupulous. Third, changes in the way humans and technology interact, exemplified (but not limited to) the Millennial generation, blur and dissolve the concepts of inside and outside, so that distinctions become invisible, or even unwanted, and boundaries become annoyances to be circumvented. A new approach to cybersecurity is needed: Organizations and individuals need to get used to operating in compromised environments. The article’s conclusion operationalize this strategy in terms of a paradigm shift away from a Castle Model and towards a more nuanced form of computation and data assurance.
AB - The predominant metaphor for secure computing today is defence in depth: higher, better layers of walls. This article explains why that approach is as outmoded for cybersecurity today as it became for physical security centuries ago. Three forces are undermining the castle model as a practical security solution. First, organizations themselves tear down their walls and make their gateways more porous because it pays off in terms of better agility and responsiveness—they can do more, faster and better. Second, technological developments increasingly destroy walls from the outside as computation becomes cheaper for attackers, and the implementation of virtual walls and gateways becomes more complex, and so contains more vulnerabilities to be exploited by the clever and unscrupulous. Third, changes in the way humans and technology interact, exemplified (but not limited to) the Millennial generation, blur and dissolve the concepts of inside and outside, so that distinctions become invisible, or even unwanted, and boundaries become annoyances to be circumvented. A new approach to cybersecurity is needed: Organizations and individuals need to get used to operating in compromised environments. The article’s conclusion operationalize this strategy in terms of a paradigm shift away from a Castle Model and towards a more nuanced form of computation and data assurance.
KW - Compromised environments
KW - Cyberdefense
KW - Generational differences
KW - Millennials
KW - Organizational boundaries
KW - Security
UR - https://www.mendeley.com/catalogue/05c229f3-02db-34a7-b5af-5040e39fd3b0/
U2 - 10.1007/978-3-319-27914-5_12
DO - 10.1007/978-3-319-27914-5_12
M3 - Chapter (peer-reviewed)
SN - 9783319279138
SN - 9783319802404
T3 - Advanced Sciences and Technologies for Security Applications
SP - 249
EP - 265
BT - Exploring the Security Landscape
A2 - Masys, Anthony J
PB - Springer
CY - Cham, Switzerland
ER -