Beyond the Castle Model of Cyber-risk and Cyber-security

Christian Leuprecht, David B. Skilicorn, and Victoria E. Tait | Government Information Quarterly | 2016

The predominant metaphor for secure computing today is modeled on ever higher, ever better layers of walls. This article explains why that approach is as outmoded for cyber security today as it became for physical security centuries ago. Three forces are undermining the Castle Model as a practical security solution. First, organizations themselves tear down their walls and make their gateways more porous because it pays off in terms of better agility and responsiveness – they can do more, faster and better. Second, technological developments increasingly destroy walls from the outside as computation becomes cheaper for attackers, and the implementation of cyberwalls and gateways becomes more complex, and so contains more vulnerabilities to be exploited by the clever and unscrupulous. Third, changes in the way humans and technology interact, exemplified (but not limited to) the Millennial generation, blur and dissolve the concepts of inside and outside, so that distinctions become invisible, or even unwanted, and boundaries become annoyances to be circumvented. A new approach to cyber security is needed: Organizations and individuals need to get used to operating in compromised environments. The article’s conclusion hints at more nuanced forms of computation in environments that must be assumed to be potentially compromised.

Citation: Leuprecht, Christian., David B. Skillicorn and Victoria E. Tait. “Beyond the Castle Model of Cyber-risk and Cyber-security.” Government Information Quarterly 33, no. 2 (2016): 250-257.

Beyond the Castle Model of Cyber-risk and Cyber-security