Ssembatya, RichardKayem, Anne V. D. M.Burke, Mark-John2019-02-142019-02-142014Ssembatya, R.; Kayem, Anne V. D. M. & Burke, M. J., 2014. Diversity in Security Environments: The Why and the Wherefore. Uganda Martyrs University, Nkozi: Uganda Martyrs University.http://hdl.handle.net/20.500.12280/1349Information security is generally discussed in terms of preventing adversarial access to applications and to the data these applications handle. The authors note, however, that increasingly, creating information security solutions that are based on the difficulty of discovering the solution is no longer a truly viable approach. Some of the reasons for this include the increasing availability of faster processing power, high-performance computing systems, and big data availability. On the opposite end, issues such as frequent power outages in resource-constrained environments make applying standard security schemes challenging. In this chapter, the authors discuss examples that highlight the challenges of applying conventional security solutions to constrained resource environments. They postulate that effective security solutions for these environments require rather unconventional approaches to security-solution design. Such solutions would need to take into consideration environmental and behavioral factors in addition to drawing inspiration in certain cases from natural or biological processes.enDiversitySecurityEnvironmentsDiversity in Security Environments: The Why and the WhereforeArticle