In recent years, Moore’s Law has begun reaching its limits, and these limits are the sizes of computer hardware. As a history review: when computers were 1st designed, they used vacuum tubes. Through a vacuum tube, this involved an airless vacuum tube meaning ‘0,’ ‘off,’ or air flowing meaning ‘1,’ ‘on.’ In contemporary phones, tablets, and computers, electricity performs this same ‘off’ or ‘on’ task; and with more electric computation devices, but also efficient circuity (electronics components and computation pathways), the more electric computation devices we have, the greater the possible computations. But in size: of the vacuum tube concepts, our common electric versions are reaching the atom’s scale. This is ~1.8E-10: of an approximate average human, it is ~0.00000018% our height. Against Quantum Computing, the basic communication, very much discussed, already, we can discuss another important subject: cyber security. In professional and academic circles, cyber security is not building elaborate 0s and 1s together, and this be cybersecurity’s sufficiency; instead, cyber security combines digital and physical security. One recent cyber security trend is called Zero Trust.
Zero Trust and Our General Awareness
On a Web site, Exploding Topics, Exploding Topics co-founder, Josh Howarth wrote The 7 Most Important Computer Science Trends In 2021. Contrary to the tradition, hierarchical trust, Howarth wrote, “Instead, nobody is trusted, whether they’re already inside or outside the network” (Howarth, December 18, 2020). Howarth was saying Zero Trust absolves all entities of criminal liability except the person accessing the network.
But this is not a good privacy measure: it does not protect the single network accessor from built-in communication errors. In fact, one wrong button press could be all law enforcement requires who criminal liability represents. In application, predictive technology could determine impending accesses: even though access criteria are better than, say, a traditional gas station robbery (clothing and apparel, sex, height & weight, skin color, and any weapon used); i.e. user ID, access portal, location, and time, these, too, can be caused by prior mistreatment such that a false identity is accessed.
This is an offense: it mistreats every employee.
In a sense, Zero Trust is perfect: for each network access sought, require a validity test. But this proof requires an absolutist attitude such that no failure can be simplified beyond the user ID, and this is a possible primary key. In the strongest case, every single network content requires an access key: from the money to the K-cup dispenser. This is like building AI: for a family’s entire house components. Plus, trusting no one means not even trusting your own authorization and authentication protocols: consider Ray Bradbury’s The Murderer.
In this ad hominem planning: eventually, the man who has enough automation shall stop biting the psychologist’s watch, and he shall fade into the shadows of his cell padding.
Remember the Golden Rule.
In IT (Information Technology) business, professionals perform their obligations, and we use many different guiding concepts. The 1 I utilize is Jesus of Nazareth’s. The Gospel of Jesus Christ According to Matthew (NIV) claims, “So in everything, do to others what you would have them do to you, for this sums up the Law and the Prophets” (7:12). Jesus of Nazareth, called the Christ, was saying be fair to the government, Law (of Israel), and the government’s evolvers, the Prophets (of Israel). The Gospel of Jesus Christ According to Luke recorded Jesus of Nazareth having said a briefer and simpler message: “Do to others as you would have them do to you” (6:31). In this case, the rule called Golden is more specialized: we can trust others, and in turn, we can each be trusted.
Through experience, build team trust.
In simple terms, bureaucracy slows progress, and we cannot meet deadlines: with absolute ethics required every single time. The ethic, Zero Trust’s, most probable outcome is compromise. Thus, at its most direct, Zero Trust is a bait-and-switch tactic; against hierarchical traditions, a more usable solution is group access. Moderate-sized or small-sized groups having access motivates team leadership initiative including security and privacy. Even executives can modularize their teams, improving the configuration management requirements to deliverables produced or serviced.
In all organization ranking categories (executive, middle management, and operations), moderate to small-sized IT teams can utilize the Agile methodology: to great effect. In a sense, this is privileged trust’s evolution: program-based or project-based trust management.
References
Howarth, J. (2020, December 18). The 7 Most Important Computer Science Trends In 2021. Retrieved February 22, 2021, from https://explodingtopics.com/blog/computer-science-trends
Comments
Post a Comment