Attack Surfaces in Society
In cybersecurity we talk about attack surfaces, which are different avenues in which vunlerabilities in systems can be exploited. There are a couple of different attack surfaces such as
- physical attack surfaces, which are physical machines such as servers, computers and USBs
- digital attack surfaces, which are software, ports, or points of entry
- social engineering attack surfaces, which is asking someone for their password or other methods of getting information for malicious purposes
In political science these are not terms that we usually think about. But recently I’ve thought about how, with a little tinkering of the metaphor, we could start thinking about attack surfaces in society too. In particular, my main thought was to look at different surfaces of what makes up a society and how, if possible, one could attack them. I have thought that a logical starting point could be these surfaces:
- Informational
- Economic
- Logistical
- Judicial
- Physical
- Energy
- Cultural
- Medical
- Geographic
- Digital
- Ecological
And,
It should go without saying that the following is my interpretation of these systems. Since I am not an informations expert lawyer who paints and does medicine and economics as a hobby, I will of course be naturally stunted by the fact that I cannot learn and do everything. I don’t want to step on anyones toes and if you have an interjection or objection to what I produce I would love to hear your constructive criticism. The fun aspect of this is going to be to learn about the general sphere of these and not get to bogged down into finer details. Instead of learning about the intricacies of neoexpressionism, we will look at what culture does and how it disseminates attitude and affect. Instead of digging into 1920’s case law, we will try to figure out how judicial systems work and what presuppositions it holds. I want to think generally and resist granularity for now. Pentesting (or attacking) is about finding granular details in particular surfaces and exploiting them. But in order to delve deeper you first need to understand some fundamentals about computers, networks, the web, interaction, and the logic which underpins it all.
A last note about systems before you move on. As stated previously, systems can often intermingle or be closely related without being the same system. Despite this, most systems have this weird tendency to show unexpected results from small differences in input. So, small inputs can produce large outputs. If you are familiar with Conway’s Game of Life you know what I am talking about. There are certain patterns which produce exponential results or even infinite growth. While an illness cannot reproduce itself infinitely (since there is a finite amount of living creatures), it can grow incredibly quickly from very modest start points. The right person being infected at wrong time can wreck havoc on an urban center or even put the world in to lockdown. Understanding attack surfaces is about trying to understand generally how different systems influence us and other systems. So, while I discuss systems independently from eachother, they are very much dependent on eachother and will frequently overlap.
With this said, let us start this non-comprehensive journey with systems and talk about a persons interaction with systems.
.dash
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQTcOGAxP8k/AtPPD/mFtc4Wkq/a8gUCZ6pjDQAKCRCFtc4Wkq/a 8rj5AQDXpICL1l94ijSHUmXxEvn5wRKJB1yB6IIXkhBD4geVVwD+NSyzR/Q0JaT1 UH3AqZKBxg7OyuI1uuBtN/igHWF4ogU= =OILg -----END PGP SIGNATURE-----Comments