Rational Insight into all Things Cybersecurity

WELCOME to the Science Of Cybersecurity—where we establish the first founding principles of a new science of Information Security.

Some experts are adamant that Cybersecurity can never be established as a science. This is claimed to be so because—any and all social accessibility protections which are put in place will always have human opponents. That is, in this field alone, human antagonists exist—who work constantly to try and break any security measures present. Accordingly, Cybersecurity is not a science—but is more akin to a game, war or political struggle.

Whilst we do acknowledge the existence of vital social elements within the boundaries of the highly technical field of Cybersecurity; it is our belief that application of the scientific method—consisting of a combination of empirical observation and logical reasoning—must always play a significant and foundational role in any Cybersecurity scenario whatsoever. QED.

Our goal is to bring formalism to a field that doesn’t even have one—that is to bring unity, consistency and order—to the field of Information Security. Strangely absent is any kind of top-level theory, and missing are fundamental definitions and/or first-principles etc. Ergo, the system-designer’s job becomes one of—collecting partial formalism(s)—before somehow stitching them together. The net result is—partial truth(s) and/or sub-optimal approaches—or at least major difficulties.

Conversely, we seek to establish a foundational framework for the entire field of: Information Security; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.


Cybersecurity Crisis

The field of Cybersecurity is currently experiencing a major of Crisis Of Confidence—and in terms of the questionable truth/validity/usefulness of its most fundamental premises, arguments, conclusions and recommended security methods. Whereby data breaches, hacks, system-exploits and computer intrusions are now common-place.

In search of answers—we adopt a scientific approach to Cybersecurity—with the stated aim of eliminating all of the confusion, uncertainty and risk which plagues the subject area. Importantly, you will not find elsewhere any part of our new theory of Cybersecurity Science—because these materials are unique and they are not available on any website, book, blog, course and/or certification.

Everything here evolved from Alan Radley’s much-heralded book: ‘The Science of Cybersecurity – A Treatise On Communications Security—which established the founding principles for a new science of Information Security. Whereby we have coined over 60 new terms in a comprehensive Cybersecurity Lexicon, identified 62 Cybersecurity Axioms, plus mapped 500 fundamental classes of Cybersecurity entities, states and processes etc.

And all of this information has been approved by over 100 leading Cybersecurity experts—so you know that it is pertinent, useful and correct.


A Quest For Insightful Answers

How do data breaches, hacks, system exploits and computer intrusions happen—and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?

On a quest for insightful answers in his ground-breaking book and associated website, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.

A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model—and accurate taxonomic tree—of all possible types and classes of cyber-attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest—yet practically oriented—treatise on Cybersecurity.

Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both—the engineering-minded professional—and the less technically-oriented.


Solid Foundation

Our new theory of Cybersecurity is grounded on a set of core principles, including for example the Cybersecurity System Access Gateways (CSAG) diagram.

The CSAG diagram teaches that in order for a Datum or Datum-Copy—existing on a networked computer system—to have its inner meaning ‘extracted’ by either a legitimate user or else an illegitimate intruder—then that same party must first possess a means of opening up a PHYSICAL GATEWAY in order to see/touch the physical FORM of the Datum held on a Media of Storage, Transfer or Access (i.e. obtain a physical copy). 

Next on said media the party traverses one or more VIRTUAL GATEWAYS to obtain the Datum’s raw format (i.e open a virtual copy). Finally the party in question—must decode the Datum’s inner meaning or CONTENT by traversing one or more of 3 kinds of MEANING GATEWAYS: named as the Metrical, Selectional and Descriptive layers—which may be nested together, one on top of another, in a russian-doll fashion.

Cybersecurity is then defined simply, and completely, as the continuous processes of PROTECTING (i.e. Locking, Blocking and/or Concealing) all necessary gateway types—that is defending the Datum’s inner meaning from unwarranted disclosure—whilst at the same time ENABLING legitimate users to access said Datum’s inner meaning by means of readily accessible system gateways. QED.

 

Infographic_A7

SCF 1.0 – InfoGraphic A

Cybersecurity System Access Gateways

Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley

 

Infographic_G6

SCF 1.0 – InfoGraphic G

Venn Diagram

Cybersecurity System Access Gateways

Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley

Your Trusted Source…

At ScienceOfCybersecurity.com we seek to establish Cybersecurity as a Science—the same being a long-term goal that can only be achieved with the help of the Cybersecurity community. Luckily, a large number of security experts have contributed to our developing Science Of Cybersecurity Framework—and said theory reflect(s) the knowledge of all these academic researchers, engineers and practitioners.

We are on the lookout for partners/contributors; plus seek details of the very best Cybersecurity resources—so drop us a line!

Dr Alan Radley , Blackpool, UK.

E: alan[at]scienceofcybersecurity[dot]com.


KeyMail – Risk-free Data Transfer

KeyMail is used to send confidential items directly to colleagues across the Internet—with Absolute Security—and no third-party copies. KeyMail affords the strongest possible encryption protection for your private communications (RSA 4096 / AES 256)— and it meets/exceeds US Government standard for Top-Secret Data.

In a nutshell, having no vulnerable ‘third-party’ or ‘Cloud’ copies—of client-data, logins and encryption keys—to attack / steal—means no hacking chances for any and all Threat Actors.

 

sending_1.png

KeyMail running on an Apple Computer