Giter VIP home page Giter VIP logo

Comments (1)

rocchettomarco avatar rocchettomarco commented on June 1, 2024

I won't focus on social engineering attacks and focus on SW, for simplicity, even when I use the more general term system.

Any weakness exploited by an actor is a behavior of the system (SW). The actor just plays the role of executing it, the rest is psychological. The fact is: (A) a behavior of a SW is there, and (B) we didn't expect it, (C) or we didn't expect its effects on other systems. Your first question deals with architectural/intensional weaknesses.

My answer to your challenge (1) is: absolute. We may not be able to predict all the actions of an active attacker, but we can categorize them based on their consequences/effects on systems' behaviors (maybe even in the case of social engineering attacks).

Challenge (3) asks: is a general understanding of cybersecurity describing the phenomenon? If phenomenon=cybersecurity then, tautologically, yes.
If we change your third question into: (3.1) is there, today, a general understanding of cybersecurity? And, if not, (3.2) can we ever reach it?

If, e.g., CIA (and the infosec view of 27001) is taken as correctly identifying secure systems, this is an axiom (or rather a dogma). Its opposite should be taken as a determination of insecurity=not(security)=not(CIA(system)). The fact that no one has an acceptable metric to distinguish (cyber)security and insecurity in general makes us reach the following inconsistent conclusion. If there is metric s.t. A is secure and not A is insecure, we should suspend any judgment (and insurances should be always fair on cybersecurity... Pfff, already proves the point). And this metric implies that we have the choice between a belief (related to the aforementioned dogma) of security or insecurity. But this doesn't seem to be possible (as in Herley's paper) because we have beliefs of security (a system which is believed to be - even just - confidential) and then we find ourselves wrong. So, to 3.1: no, there is no cybersecurity theory describing the phenomenon but (to 3.2) this doesn't imply that there is no such thing as a general theory of cybersecurity.

This helps us with challenge (2), which is rather religious (I smell the following doubt: if knowledge is the finite construction of a concept/weakness, if my general understanding is an extensional property of a system, we are unlikely to know weaknesses) - the argument so far shows that our belief in CIA drives us towards policies and procedures that are expensive and towards systems where CIA is believed to hold but doesn't. And even when it was not due to the customer (e.g. a customer with perfect 27001) as in the case where a confidentiality issue is due to a lack of understanding of the designer of the confidential system.

The answer to (2) deals with a concept (cybersecurity) and its limit (the knowledge of it, e.g., given a specific system). Take an open set limited by a function as representing an understanding on cybersecurity (so assume a negative answer to (2) due to the limiting definition, and not a "certain" and finite logic or construction), what is this limit? What is this function? This type of questions cannot be decided in general due to some Rice, Gödel and Turing :) but we are not at this stage of evolution yet. There is no agreement on what a system is​(it's architecture as a syntactic object). We also don't agree on what a system does (its behavior) as a function, but this is another game. Let's focus on the fact that we don't agree on which of the many mathematical objects can be taken as representative to express security related concepts such as CIA or 27001. Well, there aren't so many objects at this level... Natural numbers, zero and successor? Euclidean point and line? The existence of a primitive function and a connection between functions? They all create a structure which can be investigated to obtain CIA guarantees in an automated, numerical, way. Furthermore, an analysis related to CIA and 27001 (not just a verification) over such structures is not just a matter of expertise but is expertise which produces facts (they really can just be tested or falsified but... you know... give it or take it). Current expertise is worth a fortune in the current market, that is the economic value of such enterprise. Hard and impossible are two different things.

from cybersecurity.

Related Issues (1)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.