Analogue Network Security

WHY ANALOGUE SECURITY?

In 1973, the Bell-Lapadula security model was introduced and is fundamentally still how security is implemented: with static fortress mentality.

In 1987, the U.S. Department of Defense published the Red Book; the Network Interpretation of the lauded Orange Book that set forth many of the principles for information security. The results were, essentially, “we have no earthly idea how to secure a network.”

Today, we now assume our networks are “P0wn3d” — already infiltrated by hostiles.

We “know” that by adding more technology, our security problems will go away. We think of “the network” as a single “thing” and attempt to protect it as such. It isn’t, and we can’t.

TCP/IP. It was just an experiment.

Today, it is the inter-infrastructural foundation of civilization. The internet of things is adding so-called intelligence to some 50+ billion endpoints. Where’s the security? Or privacy? Massive new projects using next generation, smarter, faster ways of doing the same old stuff all over again is the ultimate déjà vu epic fail of security.

Is this any way to run a business? Or a planet?

C’mon, 50 years of practice and we’re still…? Well, screw it. You’ll see.

I started here: ROOT is the root of all cyber-evil, passwords will be the downfall of us all and the game is really about IdM. Security requires a single, interdisciplinary metric for the cyber, physical and human domains. Digital is not binary.

Then things fell into place. I have a few ideas I’d like to share.

Sign Up to be Notified for the Release!

Just enter your email address below (fake, real, doesn’t matter — just needs to reach you), and when Analogue Network Security is ready for you, we’ll send you the info and links. You’ll find out in advance, and your copy will be signed.

We really won’t sell or abuse your email, either. In fact, we solemnly swear that once the book is available for order, we will send you only 2 emails:

  1. To notify you that it’s ready, and to direct you to a shopping cart.
  2. A follow-up a few weeks later, to beg you to buy a copy.

Then we shred the list! Simple as that. Anything else is just plain rude.

Leave a Comment

We would be glad to get your feedback. Take a moment to comment and tell us what you think.