WELCOME to the Science Of Technology—affording deep and rational insight into the Fourth Industrial Revolution—a technological transformation that will fundamentally change the way we live, work, and relate to one another. In terms of its scale, scope, speed and complexity, the transformation will be unlike anything humankind has experienced before.
The First Industrial Revolution used water and steam power to mechanise production; and the Second used electric power to create mass production; whilst the Third used electronics and information technology to automate production. Now a Fourth Industrial Revolution is characterised by a fusion of technologies that blurs the lines between the physical, digital and biological spheres.
A new world is emerging—named Industry 4.0—which can be identified by the transformation of entire systems of production, management and governance. And these possibilities will be multiplied by emerging technology breakthroughs in fields such as Artificial Intelligence (AI), robotics, the Internet of Things (IoT), Virtual and Augmented Reality, 3D-printing, nanotechnology, biotechnology, materials science, plus eco-friendly power generation, distribution, usage and storage systems.
Central to Industry 4.0 will be finding new ways to leverage AI, the Internet and the IoT—through distributed networks of things, robots and services with localised learning plus that benefit from the wisdom of the crowd (big-analog data).
The future is one of—Situated Intelligence—built into every Thing; wherein your every action will be streamlined, augmented and automated by AI technology in one way or another. Welcome to the new world of smart-city; smart-industry and smart-home: strap on your seat-belt—the next few years are going to an exhilarating ride!
Instrumentation of the World
The instrumentation of the entire world is underway. A key trend will be visibility of services—from anywhere at any time. Objects will work together and collaborate amongst themselves, yet be able to self-compute and self-act to solve local problems with great efficiency and speed.
But without DATA the AI, Intelligent Things and Robots will not work; and this is where Internet connectivity provides the link that will hold everything together. The upshot is that he/she who owns the data—plus the associated networking capability—owns the future. Ergo hopefully we can build eminently human-centric systems—whereby the rightful owner is empowered to take control of his/her own information. Whilst at the same time placing information that pertains to the collective—under public ownership/visibility. QED.
Technological innovation will also lead to a supply-side miracle, with long-term gains in efficiency and productivity. Transportation and communication costs will drop, logistics and global supply chains will become more effective, and the cost of trade will diminish, all of which will open-up new markets, empower individuals and drive economic growth.
The changes that will be introduced as a result of Industry 4.0 will be all-encompassing and profound; and it is difficult to make any concrete predictions about who will benefit and who (may regrettably) loose out as a result of the extant technology transformations. Our hope is that the revolution can shift power towards the people—and that technology can become a vast connecting, enabling, plus collaborative and humanising force for everyone, everywhere.
Key Technology Topics
Our goal is to establish the founding principles of a new scientific approach to six key areas of the Industry 4.0 landscape; named as:
- Artificial Intelligence (AI)
- Networks (M2M, H2M, M2H)
- Virtual and Augmented Reality (VR)
- Knowledge Machines (H2H)
- Internet Of Things (IoT)
We wish to become an authoritative source of knowledge for each of these six industry defining topics—and to probe related matters in greater depth than has been achieved thus far. Obviously we cannot achieve such an audacious objective alone and/or right away; but we do aim to take significant steps towards the same goal by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.
But how can we achieve such an ambitious goal? Well already we have made significant progress in the Cybersecurity field along these same lines—and by supplying a scientific framework that allows theoreticians and practitioners alike to develop, share and apply state-of-the-art Cybersecurity principles and practical knowledge. Please take a few minutes to read our reviews—and note the eminence and job-titles of each reviewer.
Accordingly, we aim to grow significantly and to expand the knowledge available on this site into the new subject areas by means of grass-roots support. For a collective endeavour such as this one; there is strength in numbers—and more people leads to more knowledge! Already our readership has reached several thousand practitioners—and we are now working hard to expand this number significantly—and especially in regard to the new subject areas. Why not get involved and send us your ideas of how we can expand, improve and grow.
Our hope is that the principles and theoretical models developed herein—can be used used to create eminently practical technological solutions that are in close harmony with humanistic principles. Nevertheless, and despite remaining optimistic, we must admit that Industry 4.0 has many dangers; and not the least of which are the increased danger(s) and likelihood of data breaches, hacks, and system exploits etc. Henceforth we have begun our analysis with the field of Cybersecurity as explained below.
Science Of Cybersecurity
WELCOME to the Science Of Cybersecurity—where we establish the first founding principles of a new science of Information Security.
Some experts are adamant that Cybersecurity can never be established as a science. This is claimed to be so because—any and all social accessibility protections which are put in place will always have human opponents. That is, in this field alone, human antagonists exist—who work constantly to try and break any security measures present. Accordingly, Cybersecurity is not a science—but is more akin to a game, war or political struggle.
Whilst we do acknowledge the existence of vital social elements within the boundaries of the highly technical field of Cybersecurity; it is our belief that application of the scientific method—consisting of a combination of empirical observation and logical reasoning—must always play a significant and foundational role in any Cybersecurity scenario whatsoever. QED.
Our goal is to bring formalism to a field that doesn’t even have one—that is to bring unity, consistency and order—to the field of Information Security. Strangely absent is any kind of top-level theory, and missing are fundamental definitions and/or first-principles etc. Ergo, the system-designer’s job becomes one of—collecting partial formalism(s)—before somehow stitching them together. The net result is—partial truth(s) and/or sub-optimal approaches—or at least major difficulties.
Conversely, we seek to establish a foundational framework for the entire field of: Information Security; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.
The field of Cybersecurity is currently experiencing a major of Crisis Of Confidence—and in terms of the questionable truth/validity/usefulness of its most fundamental premises, arguments, conclusions and recommended security methods. Whereby data breaches, hacks, system-exploits and computer intrusions are now common-place.
In search of answers—we adopt a scientific approach to Cybersecurity—with the stated aim of eliminating all of the confusion, uncertainty and risk which plagues the subject area. Importantly, you will not find elsewhere any part of our new theory of Cybersecurity Science—because these materials are unique and they are not available on any website, book, blog, course and/or certification.
Everything here evolved from Alan Radley’s much-heralded book: ‘The Science of Cybersecurity – A Treatise On Communications Security‘—which established the founding principles for a new science of Information Security. Whereby we have coined over 60 new terms in a comprehensive Cybersecurity Lexicon, identified 62 Cybersecurity Axioms, plus mapped 500 fundamental classes of Cybersecurity entities, states and processes etc.
And all of this information has been approved by over 100 leading Cybersecurity experts—so you know that it is pertinent, useful and correct.
A Quest For Insightful Answers
How do data breaches, hacks, system exploits and computer intrusions happen—and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?
On a quest for insightful answers in his ground-breaking book and associated website, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.
A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model—and accurate taxonomic tree—of all possible types and classes of cyber-attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest—yet practically oriented—treatise on Cybersecurity.
Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both—the engineering-minded professional—and the less technically-oriented.
Our new theory of Cybersecurity is grounded on a set of core principles, including for example the Cybersecurity System Access Gateways (CSAG) diagram.
The CSAG diagram teaches that in order for a Datum or Datum-Copy—existing on a networked computer system—to have its inner meaning ‘extracted’ by either a legitimate user or else an illegitimate intruder—then that same party must first possess a means of opening up a PHYSICAL GATEWAY in order to see/touch the physical FORM of the Datum held on a Media of Storage, Transfer or Access (i.e. obtain a physical copy).
Next on said media the party traverses one or more VIRTUAL GATEWAYS to obtain the Datum’s raw format (i.e open a virtual copy). Finally the party in question—must decode the Datum’s inner meaning or CONTENT by traversing one or more of 3 kinds of MEANING GATEWAYS: named as the Metrical, Selectional and Descriptive layers—which may be nested together, one on top of another, in a russian-doll fashion.
Cybersecurity is then defined simply, and completely, as the continuous processes of PROTECTING (i.e. Locking, Blocking and/or Concealing) all necessary gateway types—that is defending the Datum’s inner meaning from unwarranted disclosure—whilst at the same time ENABLING legitimate users to access said Datum’s inner meaning by means of readily accessible system gateways. QED.
SCF 1.0 – InfoGraphic A
Cybersecurity System Access Gateways
Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley
SCF 1.0 – InfoGraphic G
Cybersecurity System Access Gateways
Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley
Your Trusted Source…
At ScienceOfTechnology.org we seek to establish and apply the principles of the 4th Industrial Revolution; but patently this goal can only be achieved with the help of our knowledgeable readership.
Already a large number of security experts have contributed to our developing Science Of Cybersecurity Framework—and said theory reflect(s) the knowledge of all these academic researchers, engineers and practitioners. In a like manner, hopefully we can recruit the support of experts in the new subject areas as well.
We are on the lookout for partners/contributors; plus seek details of the very best resources—so drop us a line!
Dr Alan Radley , Blackpool, UK.
KeyMail – Risk-free Data Transfer
KeyMail is used to send confidential items directly to colleagues across the Internet—with Absolute Security—and no third-party copies. KeyMail affords the strongest possible encryption protection for your private communications (RSA 4096 / AES 256)— and it meets/exceeds US Government standard for Top-Secret Data.
In a nutshell, having no vulnerable ‘third-party’ or ‘Cloud’ copies—of client-data, logins and encryption keys—to attack / steal—means no hacking chances for any and all Threat Actors. You can read more about KeyMail here.
KeyMail running on an Apple Computer