AD-CYB-201

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

TR500A

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by AmbassadorCoyote3748

Report
Computability Theory Anna Delao Department of Technology, Grand Canyon University CYB-201 Bakke November 5th, 2023
Review of “Cyber Gravity: The Inevitable Collapse of our Technology” The article discusses the concept of "Cyber Gravity" as a novel threat in the cybersecurity domain, highlighting the idea that intricate, interconnected systems tend to reach a critical state, making it challenging to foresee and prevent catastrophic failures. This critical state, termed "Self-Organized Criticality (SOC)," occurs when small changes within these systems can trigger cascading failures. SOC's unpredictability is a significant concern in cybersecurity, as cyber threats evolve rapidly and unexpectedly. The growing complexity of interconnected systems, including vehicles, buildings, smartphones, and other Iot devices, creates vulnerabilities that are hard to predict. Traditional probability models, such as the bell curve, are unsuitable for addressing these risks, as they assume a comprehensive understanding of variables, which is often lacking in the real world. The article suggests a shift from prevention to response as a more practical strategy. It advocates continuous evaluation of new technologies for their "cyber gravity" and the development of flexible response policies to mitigate the impact of inevitable system collapses. In conclusion, the article argues that the increasing complexity of technology systems, coupled with the concept of self-organized criticality, makes predicting and preventing catastrophic failures a formidable challenge. Cybersecurity monitoring is not rendered impossible but becomes exceptionally complex, emphasizing the importance of adaptive response strategies.
Review of “An Introduction to Computability Theory and Complexity” The article provides valuable insights into the fundamental concepts of computability and complexity in the context of computer science, highlighting the existence of problems that are unsolvable or intractable. While it does not explicitly predict a time when the complexity of interconnected technology will make cybersecurity monitoring impossible, it does indirectly shed light on the challenges that may arise in the field of cybersecurity due to growing technology complexity. As technology continues to evolve and interconnect at an unprecedented pace, the challenges faced by cybersecurity professionals are becoming increasingly intricate. The article discusses the existence of problems that are "undecidable" or unsolvable, such as the halting problem, which implies that there are limits to what computers, including those used for cybersecurity monitoring, can determine or predict. In other words, there are inherent limitations to the computational power and efficiency of machines. The more complex and interconnected technology systems become, the greater the number of potential vulnerabilities and attack vectors. This complexity can make it extremely challenging to predict and prevent cyber threats effectively. As technology advances and diversifies, cybercriminals find new and innovative ways to exploit weaknesses, making the task of securing these systems even more daunting. While the article focuses on the theoretical aspects of computability and complexity, it indirectly raises concerns about the practical implications for cybersecurity. The "P vs. NP" problem mentioned in the article, which remains an unsolved question, highlights the ongoing challenges
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
in determining which problems can be solved efficiently. In the context of cybersecurity, the distinction between efficiently solvable and intractable problems is crucial, as it impacts the ability to protect against cyber threats effectively. In summary, the complexity of interconnected technology systems and the potential limitations of computability and computational complexity discussed in the article suggest that there may come a time when certain aspects of cybersecurity monitoring become extremely challenging. While it may not render cybersecurity monitoring "impossible," it underscores the need for continuous adaptation, innovative strategies, and a deep understanding of the evolving technology landscape to stay ahead of cyber threats in an increasingly complex digital world.
Works Cited Bajin, M. (2023, January 1). An Introduction to Computability Theory and Complexity . Retrieved from Toptal.com: https://www.toptal.com/algorithms/computability-theory-complexity Saylors, E. (2015, August 23). towardsdatascience.com . Retrieved from Cyber Gravity: The Inevitable Collapse of our Technology: https://towardsdatascience.com/cyber-gravity-the- inevitable-colaspe-of-technology-260610b0abc7