Ștefan Hărșan Fárr is a computer science professional and entrepreneur with twenty years of software engineering, design and analyses experience. He has worked extensively within the domains of application development, application design, security, communication, technology standards, analytics and applied his expertise for major clients from IT, banking, pharma, tourism, etc.
His greatest passion is AI, specifically computer to computer communication, human computer interaction, natural language, language design and computer semantics where he performed extensive research over the years. He’s also passionate about physics, system theory, social sciences and evolution. Free time, is a concept he does not understand, as he always fills all his time with projects that he handles with utmost seriousness, whether they are paid, personal or community oriented. He takes pleasure in sharing his knowledge as well as learning from the community because he believes mindfulness, awareness and cooperation and key to a healthy society.
Vulnerable by nature. Understanding security within the context of SaaS and IoT
A lot of the human understanding of the environment when faced with new, unfamiliar things, is based on assumptions derived from previous experience with things we deem similar. There is a tremendous amount of guessing that we use to substitute for all those things we are incapable to thoroughly understand. When this guessing does not result in an error that would trigger rectification, it will end up in convictions, knowledge, the truth of which we take for granted. If however such convictions prove to be erroneous, we risk taking wrong decisions not because our logic is faulty, but because it is based on assumptions that are false.
When it comes to security in cyberspace we tend to apply the same principles of transposing our understanding of security and defense from the real world into that of the cyberworld. As natural as this behavior is, it is unfortunately a very slippery slope, because today’s cyber environment has fundamental differences from reality, which we fail to take into consideration. With the economy becoming ever more service oriented, driven by massive information collection and analyses (Big Data), infused with more and more automation and autonomous agents, our understanding of this reality is becoming thinner and thinner, infused with more false assumptions than actual facts. This ever growing schism between how we think cyberspace operates and how it actually does, creates false expectations that inevitably set us up to becoming victims.
The present work, tries to destroy some of these false assumptions, shedding light to the ways cyberspace really operates. From the ghosts in the cyberspace, through the vulnerabilities of secure connections, the misconceptions about authentication and the unfamiliar nature of distributed environments, the work will evidential what are our exposed facets and how are they vulnerable. The hope is that by better understanding these aspects, we will be capable of mounting better defenses, with less energy and resources, because the first step in solving a problem is understanding the problem.