Cargando…
Resilience to Leaking — Dynamic Systems Modeling of Information Security
Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ‘unjust’ systems or ‘conspiracies’. Eventually, such threats to...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2012
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3515608/ https://www.ncbi.nlm.nih.gov/pubmed/23227151 http://dx.doi.org/10.1371/journal.pone.0049804 |
_version_ | 1782252219873099776 |
---|---|
author | Hamacher, Kay |
author_facet | Hamacher, Kay |
author_sort | Hamacher, Kay |
collection | PubMed |
description | Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ‘unjust’ systems or ‘conspiracies’. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for ‘just’ and ‘unjust’ entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the ‘conspiracy’). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean’ in direct adversary relations, but do not necessarily increase public benefit and societal immunization to ‘conspiracies’. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here. |
format | Online Article Text |
id | pubmed-3515608 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2012 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-35156082012-12-07 Resilience to Leaking — Dynamic Systems Modeling of Information Security Hamacher, Kay PLoS One Research Article Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ‘unjust’ systems or ‘conspiracies’. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for ‘just’ and ‘unjust’ entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the ‘conspiracy’). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean’ in direct adversary relations, but do not necessarily increase public benefit and societal immunization to ‘conspiracies’. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here. Public Library of Science 2012-12-05 /pmc/articles/PMC3515608/ /pubmed/23227151 http://dx.doi.org/10.1371/journal.pone.0049804 Text en © 2012 Kay Hamacher http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited. |
spellingShingle | Research Article Hamacher, Kay Resilience to Leaking — Dynamic Systems Modeling of Information Security |
title | Resilience to Leaking — Dynamic Systems Modeling of Information Security |
title_full | Resilience to Leaking — Dynamic Systems Modeling of Information Security |
title_fullStr | Resilience to Leaking — Dynamic Systems Modeling of Information Security |
title_full_unstemmed | Resilience to Leaking — Dynamic Systems Modeling of Information Security |
title_short | Resilience to Leaking — Dynamic Systems Modeling of Information Security |
title_sort | resilience to leaking — dynamic systems modeling of information security |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3515608/ https://www.ncbi.nlm.nih.gov/pubmed/23227151 http://dx.doi.org/10.1371/journal.pone.0049804 |
work_keys_str_mv | AT hamacherkay resiliencetoleakingdynamicsystemsmodelingofinformationsecurity |