SlideShare a Scribd company logo
1 of 107
Download to read offline
The Cost of
Complexity
Aaron Bedra
Chief Scientist, Jemurai
@abedra
keybase.io/abedra
This is a talk on
systems theory
I want to discuss our
approach to complexity
and problem solving
You are all
systems thinkers
At least you should
be!
Before we dive into
properties of systems,
let’s clear something up
Complicated
!=
Complex
Complicated: The definition of
insanity is doing the same thing
twice and expecting different
results
Complex: The definition of insanity
is doing the same thing twice and
expecting exactly the same
results
Complicated systems
are knowable
Complicated systems
are controllable
Order in complicated
systems is achieved via
best method of operation
Stability is achieved via
compliance with the best
method
Complex systems are
not knowable
A complete description
is impossible
A mathematical
description is intractable
Complex systems consist of
numerous components that are
interrelated in multiple ways
Complex systems are
open systems
Order in complex systems
cannot be imposed
Security is impossible
We live in a world of
open systems
But we treat them as
closed
We do this because
choice is forced on us
Unintentionally treating complex
systems as complicated sets us
up for failure
What is the objective
of your system?
“If you can't describe what you
are doing as a process, you
don't know what you're doing”
— W. Edwards Deming
Tools for Systems Thinkers: The 6 Fundamental Concepts of Systems Thinking
Interconnectedness
“A system is a set of components that work
together in particular environments to
perform whatever functions are required to
achieve the system’s objective”
— Donella Meadows
Everything is
connected
The choices we make are
typically not localized
And may cause new
emergent properties of
the system
When you interfere with the
system’s ability to achieve it’s
objective, it will find a new way
Password complexity
Emergence
Properties of a system
emerge from the interactions
between parts of the system
It is those properties that
we must reason about
Not the constraints we
impose on the system
Our choices create new
emergent properties
We must consider the potential
for new emergent properties
based on our choices
Do not rely on the expected
outcome, observe the
emergent properties!
Feedback Loops
“A complex system cannot be
reduced to the behavior or
compliance of individual components”
— Sidney Dekker et al
We focus heavily on
feedback loops
They are a major part of
every information system
Negative, or reinforcing
loops are an inherent part
of any stable system
But we lean too heavily
on reinforcing loops
The State of Security
Reinforcing loops reduce
diversity in the system
“Theoretically, success and resilience
in complex systems derives not from
compliance, but from diversity”
— Sidney Dekker et al
Synthesis
Our ability to see the
interconnectedness is
incredibly important
We are all skilled within
some part of the system
But most of us fail at
synthesis
Not because we can’t
do it
But because it’s not a
habit we have trained
Some of us have gotten
better at synthesis
Talk to your red team
for more information
Or your risk team*
Or better yet, spend
some time with the COO
Causality
The system outside our
system puts constraints
on our system
Constraints are meant
to be interpreted
Meeting a constraint is
about creating an outcome
In its truest form, it’s
about causality
There are typically
multiple ways to meet a
constraint
Or completely
disregard it
An effect cannot occur
before its cause
Before you react to an
effect, make sure a cause
exists!
“Rational behavior requires
theory. Reactive behavior
requires only reflex action”
— W. Edwards Deming
To be a great information
security professional you
must understand these ideas
While you may be
great at a part or two
It’s your understanding of
the system that makes
you truly valuable
We all need to get
better at this
Let’s bring it back to
our world for a minute
Why did it take so long
to fix meltdown?
While we understood the
microcode updates, there were
other properties of the system that
weren’t apparent
Bricked machines are really
secure, but they don’t help the
system achieve its objective
Why haven’t we fixed
Spectre yet?
Proposed Options
• lfence() (compiler / static analysis) (V1)
• Retpoline (compiler) (V2)
• cmov (static analysis / type checking) (perf)
• Move to a new architecture
Most of these options
require recompilation
Or at least starting up
with a new VM/JIT
What do we do?
What properties of the
system will guide you?
If one of the required properties
was high performance, what
does that say about the system?
What is the objective
of your system?
How do we get better?
Take a systems theory
approach to information
security
Getting better at systems
• Thinking in Systems: A Primer
• Drift into Failure
• Antifragile: Things That Gain from Disorder
• Introduction to the Modeling and Analysis of
Complex Systems
• https://www.complexityexplorer.org/
Getting better at risk
• Measuring and Managing Information Risk: A FAIR
Approach
• Fooled by Randomness: The Hidden Role of
Chance in Life and in the Markets
• How to Measure Anything in Cybersecurity Risk
Learn to create closed
models of a system for
analysis
Incorporate diversity
into your models
Incorporate randomness
into your models
Incorporate chaos
into your models
But most of all,
incorporate others
The Cost of Complexity

More Related Content

Similar to The Cost of Complexity

Week 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxWeek 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docx
melbruce90096
 
Bus 304 lecture 4-intro system concepts
Bus 304 lecture 4-intro system  conceptsBus 304 lecture 4-intro system  concepts
Bus 304 lecture 4-intro system concepts
eduafo
 

Similar to The Cost of Complexity (20)

Risk [Failed failsafe] v Resilience [Safe to fail]
Risk [Failed failsafe] v Resilience [Safe to fail]Risk [Failed failsafe] v Resilience [Safe to fail]
Risk [Failed failsafe] v Resilience [Safe to fail]
 
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose TutorialArchitecting a Post Mortem - Velocity 2018 San Jose Tutorial
Architecting a Post Mortem - Velocity 2018 San Jose Tutorial
 
Management 3.0 - Complexity Thinking
Management 3.0 - Complexity ThinkingManagement 3.0 - Complexity Thinking
Management 3.0 - Complexity Thinking
 
Defining Test Competence
Defining Test CompetenceDefining Test Competence
Defining Test Competence
 
system
systemsystem
system
 
dist_systems.pdf
dist_systems.pdfdist_systems.pdf
dist_systems.pdf
 
Week 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docxWeek 5An Introduction to Systems AnalysisComplex Systems.docx
Week 5An Introduction to Systems AnalysisComplex Systems.docx
 
Bus 304 lecture 4-intro system concepts
Bus 304 lecture 4-intro system  conceptsBus 304 lecture 4-intro system  concepts
Bus 304 lecture 4-intro system concepts
 
Chaos engineering
Chaos engineering Chaos engineering
Chaos engineering
 
Ch10
Ch10Ch10
Ch10
 
Systems Thinking
Systems ThinkingSystems Thinking
Systems Thinking
 
Systemsthinking 12632353422762 Phpapp01
Systemsthinking 12632353422762 Phpapp01Systemsthinking 12632353422762 Phpapp01
Systemsthinking 12632353422762 Phpapp01
 
CST 20363 Session 2
CST 20363 Session 2CST 20363 Session 2
CST 20363 Session 2
 
JUG CH September 2021 - Debugging distributed systems
JUG CH September 2021 - Debugging distributed systemsJUG CH September 2021 - Debugging distributed systems
JUG CH September 2021 - Debugging distributed systems
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th December
 
The Hurricane's Butterfly: Debugging pathologically performing systems
The Hurricane's Butterfly: Debugging pathologically performing systemsThe Hurricane's Butterfly: Debugging pathologically performing systems
The Hurricane's Butterfly: Debugging pathologically performing systems
 
System and its types
System and its typesSystem and its types
System and its types
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
L7 Design For Recovery
L7 Design For RecoveryL7 Design For Recovery
L7 Design For Recovery
 
MSB-Distributed systems goals
MSB-Distributed systems goalsMSB-Distributed systems goals
MSB-Distributed systems goals
 

More from Aaron Bedra (8)

AWS Security Essentials
AWS Security EssentialsAWS Security Essentials
AWS Security Essentials
 
Leveling the playing field
Leveling the playing fieldLeveling the playing field
Leveling the playing field
 
Windy City Rails - Layered Security
Windy City Rails - Layered SecurityWindy City Rails - Layered Security
Windy City Rails - Layered Security
 
Focus, SCNA 2011
Focus, SCNA 2011Focus, SCNA 2011
Focus, SCNA 2011
 
Repsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application SecurityRepsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application Security
 
Pontificating quantification
Pontificating quantificationPontificating quantification
Pontificating quantification
 
Clojure in the Field
Clojure in the FieldClojure in the Field
Clojure in the Field
 
The Art of the Spike
The Art of the SpikeThe Art of the Spike
The Art of the Spike
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

The Cost of Complexity