A Department of Homeland Security Center of Excellence led by the University of Maryland

A consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism

Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security

Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security


The predominant metaphor for secure computing today is defence in depth: higher, better layers of walls. This article explains why that approach is as outmoded for cybersecurity today as it became for physical security centuries ago. Three forces are undermining the castle model as a practical security solution. First, organizations themselves tear down their walls and make their gateways more porous because it pays off in terms of better agility and responsiveness—they can do more, faster and better. Second, technological developments increasingly destroy walls from the outside as computation becomes cheaper for attackers, and the implementation of virtual walls and gateways becomes more complex, and so contains more vulnerabilities to be exploited by the clever and unscrupulous. Third, changes in the way humans and technology interact, exemplified (but not limited to) the Millennial generation, blur and dissolve the concepts of inside and outside, so that distinctions become invisible, or even unwanted, and boundaries become annoyances to be circumvented. A new approach to cybersecurity is needed: Organizations and individuals need to get used to operating in compromised environments. The article’s conclusion operationalize this strategy in terms of a paradigm shift away from a Castle Model and towards a more nuanced form of computation and data assurance.

Publication Information

Full Citation: 

Skillicorn, David, Christian Leuprecht and Victoria Tait. 2016. "Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security." In Exploring the Security Landscape: Non-Traditional Security Challenges, ed. Anthony J. Masys. Leicester: Springer International Publishing, 249-265. http://link.springer.com/chapter/10.1007/978-3-319-27914-5_12

START Author(s): 
Christian Leuprecht
Publication URL: 
Visit Website

Additional Info

Research Area: