|
The "Cellulic Cybersecurity Technology" is very
simply this a cell biomimcry IT system of three subsystems in one.
The Learning and Thinking subSystem, the Signal Controller
subSystem, and the Data Processor subSystem. The Data Processor
interacts with the larger cyber-world, while both the Controller
and the Thinking subSystems provide dynamic defensive modalities.
This role of Industrie 4.0 is quite of interest,
particularly because one curious process venture has been the
augmentation of just regular water valve with IT controller system
fitted with limited IT-brain, that supports autonomous operation
(as per Industrie 4.0). Of course, there are planned maintenance
schedules, set with "Failure finger-printing". However, expanding
this autonomous devices design through a collection of process
equipment controllers such as in Biological Process Technologies,
rapidly evolves the supporting IT onto an abstract IT-Cybernetics(Brain
?). In the analogous maze of complexity associated with collection
of autonomous devices rests the rationale of Industrie-4.0 and that
is rather curious.
The "Cellulic Cybersecurity Technology" also has
the potential for the fundamental architecting of that Cyber-Brain
derivative of the Industrie 2.0 Design and Implementation
Thinking.This then brings up the matter of the design of the IT
infrastructure for this collection of autonomous yet interactive
devices such that it interface to the Cyber-security World, the
Internet, for the purposes of the extended Enterprise operation is
not readily compromised. Agreed this process which is, say, located
in German is operating through the UN mechanism which includes
friends and foes of Germany, must at design now anticipate the
security-breach strategies of the foes and be designed accordingly.
Indeed, the consideration then is managing the challenge of
existing within the UN mechanism.
These considerations then bring up the subject of
decomposing network design into patterns for the purposes of
Pattern Analysis, such that every network design could be analyzed
in the context of a standard design or hybrid of standard designs
from which abstractions of counter-hacking architectures could be
designed for proactive defence. In a sense, the collection of
network designs prevailing may be reduced to a set of "Fundamental
Network Designs" as it were a collection of "chess moves" from
which all network designs can be abstracted and therefore subjected
to rigorous security analysis; then, of course, that presumes that
the cyber-security expert commits to a chess game with hackers:
move counter-move.
|