skip to main content
research-article
Free Access

The Evolution of Security: What can nature tell us about how best to manage our risks?

Published:01 April 2007Publication History
Skip Abstract Section

Abstract

Security people are never in charge unless an acute embarrassment has occurred. Otherwise, their advice is tempered by “economic reality,” which is to say that security is a means, not an end. This is as it should be. Since means are about tradeoffs, security is about trade-offs, but you knew all that. Our tradeoff decisions can be hard to make, and these hard-to-make decisions come in two varieties. One type occurs when the uncertainty of the alternatives is so great that they can’t be sorted in terms of probable effect. As such, other factors such as familiarity or convenience will drive the decision. This, too, is as it should be.

References

  1. Costs of Information Assurance. 2002. National Center for Manufacturing Sciences (August); http://trust.ncms.org/pdf/CostInfoAssur-NCMS.pdf.Google ScholarGoogle Scholar
  2. Borge, D. 2001. The Book of Risk. John Wiley & Sons.Google ScholarGoogle Scholar
  3. Gorman, S.P., Kulkarni, R., Schintler, L., Stough, R. 2004. Is Microsoft a threat to national security? The effect of technology monocultures on critical infrastructure. George Mason University, Infrastructure Mapping Project working paper; http://policy.gmu.edu/imp/research/Microsoft_Threat.pdf. (Full discussion of these results is outside the scope of this essay.)Google ScholarGoogle Scholar
  4. Myneni, R.B., et al. 2007. Large seasonal swings in leaf area of Amazon rain forests. Proceedings of the National Academy of Sciences 104(12): 4820-4823.Google ScholarGoogle ScholarCross RefCross Ref
  5. Holldobler, B., Wilson, E.O. 1990. The Ants. Cambridge, MA: Harvard University Press.Google ScholarGoogle Scholar
  6. Seeley, T.D., and Tarpy, D.R. 2007. Queen promiscuity lowers disease within honeybee colonies. Proceedings of the Royal Society of London 274: 67-72.Google ScholarGoogle ScholarCross RefCross Ref
  7. Wassenaar, T.M., Blaser, M.J. 2002. Contagion on the Internet. Journal of Emerging Infectious Diseases 8(3).Google ScholarGoogle ScholarCross RefCross Ref
  8. Jones, J.C., Myerscough, M.R., Graham, S., Oldroyd, B.P. 2004. Honeybee nest thermoregulation: Diversity promotes stability. Science 305(5682): 402-404.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The Evolution of Security: What can nature tell us about how best to manage our risks?

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Queue
          Queue  Volume 5, Issue 3
          DNS
          April 2007
          39 pages
          ISSN:1542-7730
          EISSN:1542-7749
          DOI:10.1145/1242489
          Issue’s Table of Contents

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 April 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format