WELCOME to the Science Of Technology—affording deep and rational insight into the Information Age—a technological transformation that will fundamentally change the way we live, work, and relate to one another. In terms of its scale, scope and complexity, the transformation will be unlike anything humankind has experienced before.
The First Industrial Revolution used water and steam power to mechanise production; and the Second used electric power to enable mass production; whilst the Third is using information technology to understand, automate and control literally everything. This new Era is characterised by a fusion of technologies that blurs the lines between the physical, digital and biological spheres.
A new world is emerging—which can be identified by the transformation of entire systems of production, management and governance. And these possibilities will be multiplied by emerging technology breakthroughs in fields such as Artificial Intelligence (AI), robotics, the Internet of Things (IoT), Virtual and Augmented Reality, 3D-printing, nanotechnology, biotechnology, materials science, plus eco-friendly power generation, distribution and storage systems.
Central to this new Era will be finding new ways to leverage AI, the Internet and the IoT—through networks of smart things, robots and services—with localised learning—plus that benefit from the wisdom of the crowd (networked machines). The future is one of—Situated Intelligence and/or Distributed Intelligence—built into every Thing. Whereby your every action will be streamlined, amplified and/or automated by AI technology—in one way or another.
Welcome to the new world of smart-city; smart-industry and smart-home: strap on your seat-belt—the next few years are going to an exhilarating ride!
Instrumentation of the World
The instrumentation of the entire world is underway. A key trend will be visibility of services—from anywhere at any time. Smart objects will self-compute and self-act to solve local problems with great efficiency and speed, but also work together and collaborate amongst themselves to benefit from big-analog data.
But without DATA—the AI, Intelligent Things and Robots will not work; and this is where Internet connectivity provides the link that will hold everything together. The upshot is that he/she who captures/processes/understands the DATA—using the associated NETWORKING CAPABILITY—shapes the future (or gains the capability to influence a particular version of the future).
Nevertheless, all DATA proceeds from, and generates: KNOWLEDGE. Whereby it is human intelligence that ultimately lies behind all machine intelligence(s). Patently there is no such thing as true artificial intelligence or fully automated decisions/actions. Put simply, every machine/system has a human creator!
It is noteworthy that Information Age will not be based on Artificial Intelligence alone. On the contrary, technologies that magnify human intelligence—individually and collectively—will remain a key area of focus, and hopefully of progress.
Hopefully we can proceed in an ethical manner—and build eminently human-centric systems. For example, by enabling the rightful owner to take control of his/her own information; whilst at the same time placing information that pertains to the collective—under public ownership.
Ergo, human-to-human networks (H2H) will be central to everything. In this respect, urgently needed is a universal Knowledge Machine or World Brain. The same being a vast collective repository for all human knowledge and hence a universal library for all the worlds thought/data-atoms. QED.
Key Technology Topics
Our goal is to establish the founding principles for seven key areas of the Information Age landscape; named as:
- Artificial Intelligence (AI)
- Communication Networks (M2M, H2M, M2H)
- Virtual and Augmented Reality (VR)
- Knowledge Machines (H2H)
- Internet Of Things (IoT)
We wish to become an authoritative source of knowledge for each of these seven industry defining topics—and to probe related matters in great depth. Obviously we cannot achieve such an objective alone and/or right away; but we do aim to take significant steps towards the same goal by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.
Already we have made significant progress in the Cybersecurity field along these same lines—and by supplying a scientific framework that allows theoreticians and practitioners alike to develop, share and apply state-of-the-art Cybersecurity principles and practical knowledge. Please take a few minutes to read our reviews—and note the eminence and job-titles of each reviewer.
For a collective endeavour such as this one; there is strength in numbers—and more people leads to more knowledge! Accordingly, we aim to grow significantly and to expand the knowledge available on this site into the new subject areas by means of grass-roots support. Currently our readership consists of several thousand practitioners—and we are working hard to expand this number significantly—and especially in regard to the new subject areas. Why not get involved and send us your ideas of how we can expand, improve and become more relevant and useful.
Our hope is that the principles and theoretical models developed herein—can be used used to create eminently practical technological solutions that are in close harmony with humanistic principles. Nevertheless, and despite remaining optimistic, we must admit that the Information Age has many potential dangers; and not the least of which are the increased likelihood of data breaches, hacks and system exploits. Henceforth we shall begun our analysis with Cybersecurity.
Science Of Cybersecurity
WELCOME to the Science Of Cybersecurity—where we establish the first founding principles of a new science of Information Security.
Some experts are adamant that Cybersecurity can never be established as a science. This is claimed to be so because—any and all social accessibility protections which are put in place will always have human opponents. That is, in this field alone, human antagonists exist—who work constantly to try and break any security measures present. Accordingly, Cybersecurity is not a science—but is more akin to a game, war or political struggle.
Whilst we do acknowledge the existence of vital social elements within the boundaries of the highly technical field of Cybersecurity; it is our belief that application of the scientific method—consisting of a combination of empirical observation and logical reasoning—must always play a significant and foundational role in any Cybersecurity scenario whatsoever. QED.
Our goal is to bring formalism to a field that doesn’t even have one—that is to bring unity, consistency and order—to the field of Information Security. Strangely absent is any kind of top-level theory, and missing are fundamental definitions and/or first-principles etc. Ergo, the system-designer’s job becomes one of—collecting partial formalism(s)—before somehow stitching them together. The net result is—partial truth(s) and/or sub-optimal approaches—or at least major difficulties.
Conversely, we seek to establish a foundational framework for the entire field of: Information Security; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.
The field of Cybersecurity is currently experiencing a major of Crisis Of Confidence—and in terms of the questionable truth/validity/usefulness of its most fundamental premises, arguments, conclusions and recommended security methods. Whereby data breaches, hacks, system-exploits and computer intrusions are now common-place.
In search of answers—we adopt a scientific approach to Cybersecurity—with the stated aim of eliminating all of the confusion, uncertainty and risk which plagues the subject area. Importantly, you will not find elsewhere any part of our new theory of Cybersecurity Science—because these materials are unique and they are not available on any website, book, blog, course and/or certification.
Everything here evolved from Alan Radley’s much-heralded book: ‘The Science of Cybersecurity – A Treatise On Communications Security‘—which established the founding principles for a new science of Information Security. Whereby we have coined over 60 new terms in a comprehensive Cybersecurity Lexicon, identified 62 Cybersecurity Axioms, plus mapped 500 fundamental classes of Cybersecurity entities, states and processes etc.
And all of this information has been approved by over 100 leading Cybersecurity experts—so you know that it is pertinent, useful and correct.
A Quest For Insightful Answers
How do data breaches, hacks, system exploits and computer intrusions happen—and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?
On a quest for insightful answers in his ground-breaking book and associated website, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.
A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model—and accurate taxonomic tree—of all possible types and classes of cyber-attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest—yet practically oriented—treatise on Cybersecurity.
Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both—the engineering-minded professional—and the less technically-oriented.
Our new theory of Cybersecurity is grounded on a set of core principles, including for example the Cybersecurity System Access Gateways (CSAG) diagram.
The CSAG diagram teaches that in order for a Datum or Datum-Copy—existing on a networked computer system—to have its inner meaning ‘extracted’ by either a legitimate user or else an illegitimate intruder—then that same party must first possess a means of opening up a PHYSICAL GATEWAY in order to see/touch the physical FORM of the Datum held on a Media of Storage, Transfer or Access (i.e. obtain a physical copy).
Next on said media the party traverses one or more VIRTUAL GATEWAYS to obtain the Datum’s raw format (i.e open a virtual copy). Finally the party in question—must decode the Datum’s inner meaning or CONTENT by traversing one or more of 3 kinds of MEANING GATEWAYS: named as the Metrical, Selectional and Descriptive layers—which may be nested together, one on top of another, in a russian-doll fashion.
Cybersecurity is then defined simply, and completely, as the continuous processes of PROTECTING (i.e. Locking, Blocking and/or Concealing) all necessary gateway types—that is defending the Datum’s inner meaning from unwarranted disclosure—whilst at the same time ENABLING legitimate users to access said Datum’s inner meaning by means of readily accessible system gateways. QED.
SCF 1.0 – InfoGraphic A
Cybersecurity System Access Gateways
Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley
SCF 1.0 – InfoGraphic G
Cybersecurity System Access Gateways
Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley
Your Trusted Source…
At ScienceOfTechnology.org we seek to establish and apply the fundamental principles of the 4th Industrial Revolution; but patently this goal can only be achieved with the help of our knowledgeable readership.
Luckily, already a large number of security experts have contributed to our developing Science Of Cybersecurity Framework—and said theory reflect(s) the knowledge of several hundred of these academic researchers, engineers and practitioners. In a like manner, hopefully we can recruit the support of experts in the new subject areas as well.
We are on the lookout for partners/contributors; plus seek details of the very best resources—so drop us a line!
Dr Alan Radley , Blackpool, UK.
KeyMail – Risk-free Data Transfer
KeyMail is used to send confidential items directly to colleagues across the Internet—with Absolute Security—and no third-party copies. KeyMail affords the strongest possible encryption protection for your private communications (RSA 4096 / AES 256)— and it meets/exceeds US Government standard for Top-Secret Data.
In a nutshell, having no vulnerable ‘third-party’ or ‘Cloud’ copies—of client-data, logins and encryption keys—to attack / steal—means no hacking chances for any and all Threat Actors. You can read more about KeyMail here.
KeyMail running on an Apple Computer