With the inherent limitations from evolution and various traps in the environment; human beings may become a breach of the Zero Trust Architecture (ZTA) for information security. We penetrate into human beings through two ZTA aspects, which are devices and data. Firstly; based on the principle of biological evolution, the fittest wins the truth; human sensing peripherals (i.e. vision, hearing, etc.) not only have limited ranges; but also produce unreal judgments such as illusions and blindsight. Secondly, cognitive neuroscience has discovered that human data storage (i.e. memory) also has weaknesses. In addition to forgetting, it is also possible to forge. Like an information system; all kinds of true and false information are constantly input from the environment; the brain must start to prevent penetration in the preprocessing stage. At the stage of data processing, the brain needs to integrate information from multiple sources; it can judge whether there is a fallacy in logic; and then make a decision. Although human beings have evolved into a system with weaknesses in information security, technologies such as AI are also gradually assisting human beings to manage their vulnerability and maintain the trustworthiness. In addition to introducing interdisciplinary knowledge such as brain science, this speech will also connect the brain and the ZTA with examples.
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .