Resilience to leaking--dynamic systems modeling of information security.

Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventual...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Kay Hamacher
Formato: article
Lenguaje:EN
Publicado: Public Library of Science (PLoS) 2012
Materias:
R
Q
Acceso en línea:https://doaj.org/article/497025151a9749b0b029ead0230bf166
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:497025151a9749b0b029ead0230bf166
record_format dspace
spelling oai:doaj.org-article:497025151a9749b0b029ead0230bf1662021-11-18T08:06:22ZResilience to leaking--dynamic systems modeling of information security.1932-620310.1371/journal.pone.0049804https://doaj.org/article/497025151a9749b0b029ead0230bf1662012-01-01T00:00:00Zhttps://www.ncbi.nlm.nih.gov/pmc/articles/pmid/23227151/pdf/?tool=EBIhttps://doaj.org/toc/1932-6203Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.Kay HamacherPublic Library of Science (PLoS)articleMedicineRScienceQENPLoS ONE, Vol 7, Iss 12, p e49804 (2012)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Kay Hamacher
Resilience to leaking--dynamic systems modeling of information security.
description Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.
format article
author Kay Hamacher
author_facet Kay Hamacher
author_sort Kay Hamacher
title Resilience to leaking--dynamic systems modeling of information security.
title_short Resilience to leaking--dynamic systems modeling of information security.
title_full Resilience to leaking--dynamic systems modeling of information security.
title_fullStr Resilience to leaking--dynamic systems modeling of information security.
title_full_unstemmed Resilience to leaking--dynamic systems modeling of information security.
title_sort resilience to leaking--dynamic systems modeling of information security.
publisher Public Library of Science (PLoS)
publishDate 2012
url https://doaj.org/article/497025151a9749b0b029ead0230bf166
work_keys_str_mv AT kayhamacher resiliencetoleakingdynamicsystemsmodelingofinformationsecurity
_version_ 1718422225484251136