Improving Cybersecurity by Upending PresumptionsSeptember 2014
Topics: Cybersecurity, Computer Security, Decision Theory, Decision Support Systems
"Even if we begin with the presumption that boundaries>equal security, there is another factor to consider: boundaries in cyberspace are fuzzy at best and sometimes don’t exist at all. As we move further into the "Internet of Things," in which the entire environment is the network, connections and participants are more fluid than ever. The author poses the thought: "In a fluid environment where an attack on me is an attack on you as well, perhaps the better presumption is that I am my sister's keeper. If my system spots bad action, it protects us both; yours does the same for me."
This paper originally appeared as part of MITRE's Cyber Connections and Directions collection.