Science of Technology

WELCOME to the Science Of Technology—where we seek to establish the founding principles of a new scientific approach to four key areas of the modern technology landscape; named as Cybersecurity, Artificial Intelligence (AI), Virtual Reality (VR), and the Internet Of Things (IoT).

Our ambitious goal is to probe each of these technology areas in greater depth than has been achieved thus far; and in each case to establish a comprehensive foundational framework for related subject matter(s). Obviously we cannot achieve such an audacious objective alone and/or right away; but we do aim to take significant steps towards the same goal by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.

One could ask why we should think that we could possibly achieve such a fantastic and imposing goal? Well already we have made some progress in the Cybersecurity field along these same lines – please take a few minutes to read our reviews – and note the eminence and job-titles of each reviewer.

In this respect, we have had significant help and support from hundreds of world-class Cybersecurity experts over the past several years (2015-2020); and we do offer our profound thanks to all of our readership in this respect. And it is our hope that we can likewise obtain further support from these same people – plus new experts – in the expanded subject areas as well. This is how we shall likewise achieve our aim(s) – by becoming a major venue and meeting point for discussions amongst practitioners, users and world-leading experts on key matters of concern. Fingers crossed.

Accordingly, we aim to grow significantly and to expand the site into the new subject areas by means of grass-roots support. Our readership now stands at over 10,000 unique visitors yearly on Cybersecurity alone – and we are now working hard to expand this number significantly – and especially in regard to the new subject areas. Why not get involved and send us ideas of how we can expand, improve and grow.

Finally, and just to establish clarity of purpose, let me state our primary goal. Put simply, we wish to become the leading proponent of the application of scientific method to technology design, building and operation – in the stated subject areas; wherein we shall employ a logical/ontological/relational approach to understanding these topics with new levels of insight. We shall – with the help of our readership – identify and scope new concepts / axioms / principles / classes / objects / processes and thus create new holistic vistas, rigorous truths, comprehensive analytical tools, plus eminently useful models and practical design templates. QED.

Our hope is that the resultant analysis will thus allow predictive models to be built that may be used to create eminently practical technological solutions that are in close harmony to humanistic principles.

Science Of Cybersecurity

WELCOME to the Science Of Cybersecurity—where we establish the first founding principles of a new science of Information Security.

Some experts are adamant that Cybersecurity can never be established as a science. This is claimed to be so because—any and all social accessibility protections which are put in place will always have human opponents. That is, in this field alone, human antagonists exist—who work constantly to try and break any security measures present. Accordingly, Cybersecurity is not a science—but is more akin to a game, war or political struggle.

Whilst we do acknowledge the existence of vital social elements within the boundaries of the highly technical field of Cybersecurity; it is our belief that application of the scientific method—consisting of a combination of empirical observation and logical reasoning—must always play a significant and foundational role in any Cybersecurity scenario whatsoever. QED.

Our goal is to bring formalism to a field that doesn’t even have one—that is to bring unity, consistency and order—to the field of Information Security. Strangely absent is any kind of top-level theory, and missing are fundamental definitions and/or first-principles etc. Ergo, the system-designer’s job becomes one of—collecting partial formalism(s)—before somehow stitching them together. The net result is—partial truth(s) and/or sub-optimal approaches—or at least major difficulties.

Conversely, we seek to establish a foundational framework for the entire field of: Information Security; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.

Cybersecurity Crisis

The field of Cybersecurity is currently experiencing a major of Crisis Of Confidence—and in terms of the questionable truth/validity/usefulness of its most fundamental premises, arguments, conclusions and recommended security methods. Whereby data breaches, hacks, system-exploits and computer intrusions are now common-place.

In search of answers—we adopt a scientific approach to Cybersecurity—with the stated aim of eliminating all of the confusion, uncertainty and risk which plagues the subject area. Importantly, you will not find elsewhere any part of our new theory of Cybersecurity Science—because these materials are unique and they are not available on any website, book, blog, course and/or certification.

Everything here evolved from Alan Radley’s much-heralded book: ‘The Science of Cybersecurity – A Treatise On Communications Security—which established the founding principles for a new science of Information Security. Whereby we have coined over 60 new terms in a comprehensive Cybersecurity Lexicon, identified 62 Cybersecurity Axioms, plus mapped 500 fundamental classes of Cybersecurity entities, states and processes etc.

And all of this information has been approved by over 100 leading Cybersecurity experts—so you know that it is pertinent, useful and correct.

A Quest For Insightful Answers

How do data breaches, hacks, system exploits and computer intrusions happen—and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?

On a quest for insightful answers in his ground-breaking book and associated website, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.

A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model—and accurate taxonomic tree—of all possible types and classes of cyber-attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest—yet practically oriented—treatise on Cybersecurity.

Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both—the engineering-minded professional—and the less technically-oriented.

Solid Foundation

Our new theory of Cybersecurity is grounded on a set of core principles, including for example the Cybersecurity System Access Gateways (CSAG) diagram.

The CSAG diagram teaches that in order for a Datum or Datum-Copy—existing on a networked computer system—to have its inner meaning ‘extracted’ by either a legitimate user or else an illegitimate intruder—then that same party must first possess a means of opening up a PHYSICAL GATEWAY in order to see/touch the physical FORM of the Datum held on a Media of Storage, Transfer or Access (i.e. obtain a physical copy). 

Next on said media the party traverses one or more VIRTUAL GATEWAYS to obtain the Datum’s raw format (i.e open a virtual copy). Finally the party in question—must decode the Datum’s inner meaning or CONTENT by traversing one or more of 3 kinds of MEANING GATEWAYS: named as the Metrical, Selectional and Descriptive layers—which may be nested together, one on top of another, in a russian-doll fashion.

Cybersecurity is then defined simply, and completely, as the continuous processes of PROTECTING (i.e. Locking, Blocking and/or Concealing) all necessary gateway types—that is defending the Datum’s inner meaning from unwarranted disclosure—whilst at the same time ENABLING legitimate users to access said Datum’s inner meaning by means of readily accessible system gateways. QED.



SCF 1.0 – InfoGraphic A

Cybersecurity System Access Gateways

Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley



SCF 1.0 – InfoGraphic G

Venn Diagram

Cybersecurity System Access Gateways

Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley

Your Trusted Source…

At we seek to establish Cybersecurity as a Science—the same being a long-term goal that can only be achieved with the help of the Cybersecurity community. Luckily, a large number of security experts have contributed to our developing Science Of Cybersecurity Framework—and said theory reflect(s) the knowledge of all these academic researchers, engineers and practitioners.

We are on the lookout for partners/contributors; plus seek details of the very best Cybersecurity resources—so drop us a line!

Dr Alan Radley , Blackpool, UK.

E: alan[at]scienceofcybersecurity[dot]com.

KeyMail – Risk-free Data Transfer

KeyMail is used to send confidential items directly to colleagues across the Internet—with Absolute Security—and no third-party copies. KeyMail affords the strongest possible encryption protection for your private communications (RSA 4096 / AES 256)— and it meets/exceeds US Government standard for Top-Secret Data.

In a nutshell, having no vulnerable ‘third-party’ or ‘Cloud’ copies—of client-data, logins and encryption keys—to attack / steal—means no hacking chances for any and all Threat Actors.



KeyMail running on an Apple Computer