Diversity in Security Environments: The Why and the Wherefore

Thumbnail Image

Date

2014

Authors

Ssembatya, Richard
Kayem, Anne V. D. M.
Burke, Mark-John

Journal Title

Journal ISSN

Volume Title

Publisher

Uganda Martyrs University

Abstract

Information security is generally discussed in terms of preventing adversarial access to applications and to the data these applications handle. The authors note, however, that increasingly, creating information security solutions that are based on the difficulty of discovering the solution is no longer a truly viable approach. Some of the reasons for this include the increasing availability of faster processing power, high-performance computing systems, and big data availability. On the opposite end, issues such as frequent power outages in resource-constrained environments make applying standard security schemes challenging. In this chapter, the authors discuss examples that highlight the challenges of applying conventional security solutions to constrained resource environments. They postulate that effective security solutions for these environments require rather unconventional approaches to security-solution design. Such solutions would need to take into consideration environmental and behavioral factors in addition to drawing inspiration in certain cases from natural or biological processes.

Description

Keywords

Diversity, Security, Environments

Citation

Ssembatya, R.; Kayem, Anne V. D. M. & Burke, M. J., 2014. Diversity in Security Environments: The Why and the Wherefore. Uganda Martyrs University, Nkozi: Uganda Martyrs University.