12.7 Sociobiologically Inspired Systems—A Final Case

Rather than a short case study to finish off this chapter, let’s develop a more complete case. Adaptive systems security in the future must be able to combine biologically inspired and socially inspired approaches to cybersecurity, especially given three trends: (1) computing devices are becoming more powerful, compact, and mobile; (2) computing devices are increasingly part of sharing resources in a cooperative ad hoc network—such as in peer-to-peer (P2P) and MANET systems; and (3) computing is becoming more virtual, such as distributed through cloud or grid computing infrastructure, which in many cases may be managed and operated by a third party such as with AWS, Microsoft’s Azure, Google ...

Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.