Understanding that many organizations experience a variety of pain points as a normal course of doing business, it’s identifying when the pain point becomes an obstacle to doing business that’s important.
In dealing with this dilemma, Aunigma has devised a number of ways to define pain points; however, first we need to contextualize the issue representing the pain point. This requires us to establish base assumptions of cyber-space’s current flaws to ensure we have a clear basis for what the ANS solution covers. There are three basic assumptions for the purpose of defining an appropriate solution:
- Three primary types of perpetrators – Threat Level 1 is the “Garden Variety”, Threat Level 2 is the “Mercenary” and Threat Level 3 is the “Nation State” (SANS Institute Threat Levels). Each level has their own drivers and capabilities which includes more advance techniques/resource focusing on differing targets. Current information security techniques only really cover Level 1 threats representing a major flaw.
- All networked IP based endpoints or nodes (Servers, Firewalls, Datasets, and End Users devices) directly or indirectly connected to a communication system, with connectivity to the Internet, has the potential for global authorized and unauthorized access. This is based upon perpetrators having time and resources to breach traditional technology and security protocols.
- Current encryption is derived from the mid 1900’s technology and has been exposed to deciphers and descriptors for more than 5 decades. Specialized or custom solutions offer some additional measures; however, with encryption key exposure as primary weakness, given time and resources are breakable by most perpetrators.