How to Get a Grip on Feedback Loops in Cyber

Jason M. Pittman
7 min readJul 12, 2023
Photo by Mitchel Lensink on Unsplash

Previously we outlined five principles of cybernetics which I asserted may hold clues for why cybersecurity- specifically, cyber network defense- has continually failed for like eight decades. I said the root cause was a misalignment between our concepts of security and cyber. The latter being related to cyberspace and cybernetics. Now, I want to dig deeper into feedback loops from the set of cybernetic principles to see if we can repair a portion of the alignment problem.

The relation needs to be developed before we explore some code. Thus, let’s jump into a non-digital example of a feedback loop that we might be able to conceptualize since it is defense-oriented.

A good example of a defense-oriented feedback loop in a biological system comes from botanical life. Specifically, a plant’s response to herbivorous insects.

Stimulus/Change: An insect starts eating the leaves of a plant.

Detection: The plant has sensors (usually chemical receptors) that detect the presence of the insect’s saliva or the physical damage caused by the insect.

Response: In response to this, the plant may produce toxic or distasteful chemicals to deter the herbivore. Some plants release volatile substances that attract predators of the herbivores eating them.

--

--

Jason M. Pittman
Jason M. Pittman

Written by Jason M. Pittman

I am a forward-leaning innovator committed to solving tomorrow’s grand challenges by developing cutting-edge research and technology today.

No responses yet