Close Menu
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    KahawatunguKahawatungu
    Button
    • NEWS
    • BUSINESS
    • KNOW YOUR CELEBRITY
    • POLITICS
    • TECHNOLOGY
    • SPORTS
    • HOW-TO
    • WORLD NEWS
    KahawatunguKahawatungu
    TECHNOLOGY

    The security stack

    CyrusBy CyrusJuly 2, 2010Updated:February 13, 2019No Comments2 Mins Read
    Facebook Twitter WhatsApp Telegram Email
    Share
    Facebook Twitter WhatsApp Telegram Pinterest Email Copy Link

    For those of you doing a double take at the title, why stop at 2?!

    Friday 21 May 2010 0900, I was oblivious to the concept of a security stack and yet, less than an hour later, I had experienced a conversion of Damascene proportions that I felt a sudden surge of empathy for Archimedes – given the fact that I was in a government building at the time, I thought it prudent not to disrobe.

    Security is currently a layer specific implementation. If we take the OSI model for example, countermeasures implemented at the network layer have no bearing on the transport layer above or the data layer below. The layers are independent of one another which is why an attacker will simply target the most porous layer, currently the application layer.

    However, imagine if the layers were interdependent on one another and communicated with one another in the event of a breach – this is the concept of a security stack. Now, taking this theme to its logical conclusion, imagine the security stack can respond to threats in real-time, we would have an adaptive security stack which would mean security nivrana.

    What I’m proposing isn’t new, it’s simply the reversal of sliced bread. Before someone decided to slice the bread, we tore it off in chunks. The idea of sliced bread is ingeniously simple and yet can you think of eating bread any other way?! We are currently serving up security in slices which attackers can circumvent/penetrate. However, if we stack the slices, then we make the attackers life that little bit harder and if we have an intelligent stack, we can make the attacker change profession

    A medieval security stack is how a relatively small group of defenders,  of a fort/castle atop a hill with one accessible route, were able to hold off a much larger army until they ran out of supplies or reinforcements arrived. If we care to learn from history, the answer to the security problem is staring us right in the face.

    Email your news TIPS to Editor@Kahawatungu.com — this is our only official communication channel

    Archimedes ISSD Conference medieval OSI model security stack
    Follow on Facebook Follow on X (Twitter)
    Share. Facebook Twitter WhatsApp LinkedIn Telegram Email
    Cyrus
    • Facebook
    • X (Twitter)

    Respected Kenyan blogger, tech evangelist, and social justice activist. Cyrus is known for his hard-hitting articles and opinions disseminated through his Twitter handle @Kahawatungu or Facebook page (www.fb.com/Kahawatungu). Email: Editor@Kahawatungu.com

    Related Posts

    How to Make a House in Minecraft

    February 9, 2026

    Court clears way for EACC to arrest, prosecute NGAAF CEO Telewa

    February 7, 2026

    How Website-Based Learning Tools Structure Pricing for Small Creators

    February 7, 2026

    Comments are closed.

    Latest Posts

    Tinie Tempah Siblings: Get to Know Kelly, Kelvin and Marian

    February 9, 2026

    Case Keenum Net Worth

    February 9, 2026

    Agnetha Fältskog Siblings: Meet Mona Fältskog Ericsson

    February 9, 2026

    Sean Paul Siblings: All About Jason ‘Jigzagula’ Henriques

    February 9, 2026

    Robert Griffin III Net Worth

    February 9, 2026

    Andrew Luck Net Worth

    February 9, 2026

    Todd Harrell Net Worth

    February 9, 2026

    Brad Arnold Net Worth

    February 9, 2026
    Facebook X (Twitter) Instagram Pinterest
    © 2026 Kahawatungu.com. Designed by Okii.

    Type above and press Enter to search. Press Esc to cancel.