Cyber Security Theory of Everything

Cyber Security Theory of Everything

To date, understanding and solving the complex nature of classical Cyber Security has proven to be difficult, if not impossible.

By observing and re-appraising this through the lens of Quantum Mechanics, and in particular Quantum Field Theories Standard Model of Particle Physics, Cyber Security can be defined as 4 Fundamental Dimensions, 2 Strong Forces, and 2 Weak Forces. Augmenting this with an Environmental Force, Interaction Force, and Connectedness Force, a grand Cyber Security Theory of Everything can begin to be developed.

No alt text provided for this image


The classical and mostly one-dimensional approach to Cyber Security inevitably leads to gaps and inconsistency in the security profile of an organisation. Key detractors include the implementation manner of the 4 Fundamental Forces and the existing limitations of the Strong Force, noticeably the Technical focus and the inferior Decision-Making process. These subsequently cause widespread entropy and decay of the Interaction and Connectedness Forces. Such misalignment can be discerned by weighing the disparate nature of organisational statements and delivery of Values, Vision, Mission, and Goals. Over time, as such deviant gaps are perceived by the workforce, a fractionation occurs, leading toward systemic internal challenges and widespread deficient Cyber Security practices.

Stupendously, the supportive and protective nature of the Environmental Force has seemingly undermined the 4 Fundamental Forces, the Strong Force, and the Weak Force due to a variety of nuanced factors. Misdirected industry norms, slow regulations and legislation including lack of authority accountability, and resistance to organisational governance and compliance have all contributed to insufficient resourcing and alignment to stated organisational and executive Values, Vision, Mission, and Goals, all of which typically relate to customer care and safety.

Eventually, rudimentary fractures begin to be detected as the organisational statement and delivery are quite divergent, and if left unchecked, advances toward a fractionation.

This workforce fractionation occurs uniquely at an individual level, as every person has both a conscious and unconscious state of awareness. Remarkably, fractionation is represented across a quadality of realities that exist simultaneously and equilaterally in each person, being our mental, physical, emotional, and spiritual selves. If one becomes triggered or aware, a state of hypervigilance or awareness is invoked, hardwiring involuntary responses from the amygdala, an area of the brain that contributes to emotional processing. This humanistic heuristic inherently leads to beware, danger, and distrust, which leads to employee self-preservation and disconnect.

If a quadality connection is consequentially eroded or damaged at a local (individual) level or system (organisational) level, relational engagement, and interconnectedness begin to break down, leading to negative traits and counterproductive workplace behaviours. The timeline horizon may often collapse, contingent upon the proximity and importance of the trigger genesis, which may also be accelerated by the Environmental and Personal State of the individual's situational needs and characteristics.

Unfortunately, organisationally, not until alignment or reconnection happens across all Interaction and Connectedness Forces of an individual's quadality, can the divide be bridged. And in most instances, this is highly unlikely.

Accordingly, any succeeding Cyber Security efforts within the 4 Fundamental Dimensions, 2 Strong Forces, and 2 Weak Forces are prone to abject failure.?


By John Mackenzie, Founder CyberEQ, GRC Cyber/Risk Specialist, Cyber Security Researcher

Shara Evans

Technology Futurist | Keynote Speaker | Strategic Consultant | Thought Leader | Forbes Top 50 Female Futurist | Future of Work | Innovation Strategist

2 年

John Mackenzie - an interesting analysis of the #cybersecurity matrix. I'm particularly intrigued by the "Connectedness Force" - as emotional and mental states are rarely discussed in this context, but certainly play a role in how one might react to a cyber threat.

David Spinks

Moderator of Cyber Security and Real Time Systems & Global Digital Identity Groups

2 年

This is certainly not a conventional way of thinking about the effectiveness and efficiency of internal (security) controls within a business.

Ridley Tony

Experienced Leader in Risk, Security, Resilience, Safety, and Management Sciences | PhD Candidate, Researcher and Scholar

2 年

Very interesting and informative. Love it!

John Mackenzie DCSc DBA(Cyber)-can GRCP GRCA IRMP IDDP

Cyber Misfit | CISO Support | Cyber Advisor | GRC Specialist | Conducted thousands of Business Reviews and Cyber Audited > $300B of assets | Won 16 State/Country Titles & 22 Marathons/Ultras

2 年
回复

要查看或添加评论,请登录

John Mackenzie DCSc DBA(Cyber)-can GRCP GRCA IRMP IDDP的更多文章

社区洞察

其他会员也浏览了