May 17, 2013 By Vikash Abraham 2 min read

What Zen, Ancient Wisdom and Infrastructure Security Have in Common

Ancient wisdom continues to amaze me, and this struck me: Isn’t there a strong correlation between ancient philosophies and infrastructure security? This blog post does not look at measuring the superiority of any one school of thought, but explores possible learnings that can be implemented in a security environment.

From a philosophical perspective, for simplicity, let’s consider two parts of spiritual practices: one that looks at external activities, and the other at internal introspection.

Recognizing Patterns From External Activities

The looking-outward practice focuses on external deeds that should be restricted or practiced, categorizing them as ‘bad’ or ‘good’ for your spiritual journey. For example: giving in to anger and greed are categorized as bad, while patience and generosity are categorized as good. What is bad has been recognized through previous experiences, as it could lead to attacking a human weakness that could hinder enlightenment. Now let’s draw a parallel with security. The bad activity can be an ‘exploit’, which can attack a system and lead to it being compromised. Over a period of time, security experts have recognized patterns of typical exploits and are able to identify the exploit by its characteristics, hence preventing it from compromising IT infrastructure. This is the ‘signature based’ approach to protecting IT infrastructure.

Awareness of Self to Help Secure Vulnerabilities

Zen propagates the need for self-awareness. This deep internal understanding of the true self is considered as the first step to awakening. From a security perspective, we look at our existing IT infrastructure to be totally aware of its vulnerabilities. Once we understand the vulnerability, we shield it, hence the exploit’s form is not of prime importance. We are not patterning the external attack, but our total awareness of self is helping us secure our own vulnerabilities. This synchronizes with IBM’s approach to infrastructure security. IBM’s network, host and virtual intrusion prevention solutions use a technology called virtual patching to shield – vulnerabilities within the infrastructure, hence known or unknown attacks trying to exploit this vulnerability are decapitated and the system is secure.

Zen suggests multiple tools to achieve self-awareness: examples include Zazen (just sitting), Koan (Short stories) and Kinhin (walking meditation). IBM’s X Force team uses its research and various information sources as tools to create the largest database of vulnerabilities present in general IT environments. The knowledge of vulnerabilities is then transferred as virtual patches to the individual IPS agents that sit at the client’s datacenters, hence creating a protection shield.

Having a Mirror That Reflects Gaps

However, like individuals, each IT environment is different, with its own customized applications and products, which again opens up a new world of vulnerabilities. Zen emphasizes the importance of having a master, whose role is to be a mirror that reflects gaps that can hinder his pupil’s awakening.

More from Mainframe

How dangerous is the cyberattack risk to transportation?

4 min read - If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and subway routes. The results could be terrible. Between June of 2020 and June of 2021, the transportation industry witnessed a 186% increase in weekly ransomware attacks. In one event, attackers breached the New York Metropolitan Transportation Authority (MTA) systems. Thankfully, no one was harmed, but incidents like these are cause…

Low-code is easy, but is it secure?

4 min read - Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and money savings. But with all this software out there, security experts worry about the risks. The global low-code platform market revenue was valued at nearly $13 billion in 2020. The market is forecast to reach over $47 billion in 2025 and $65 billion in 2027 with a CAGR of 26.1%. Very few,…

Starting From Scratch: How to Build a Small Business Cybersecurity Program

4 min read - When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services.However, while it might be helpful to have a managed service provider handle your software and computing issues, cybersecurity for small and medium businesses (SMBs) also requires a personal, hands-on approach. While you can continue to outsource some areas of cybersecurity,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today