Systempunkt

Last updated

A systempunkt ("system point") is a type of critical, vulnerable point in a system. The system may be a physical system (such as computer network) but the term is usually used when referring to a market (e. g., the French steel market, international flax market, etc.)

Market (economics) mechanisms whereby supply and demand confront each other and deals are made, involving places, processes and institutions in which exchanges occurs (for physical venues, use Q132510 or Q330284)

A market is one of the many varieties of systems, institutions, procedures, social relations and infrastructures whereby parties engage in exchange. While parties may exchange goods and services by barter, most markets rely on sellers offering their goods or services in exchange for money from buyers. It can be said that a market is the process by which the prices of goods and services are established. Markets facilitate trade and enable the distribution and resource allocation in a society. Markets allow any trade-able item to be evaluated and priced. A market emerges more or less spontaneously or may be constructed deliberately by human interaction in order to enable the exchange of rights of services and goods. Markets generally supplant gift economies and are often held in place through rules and customs, such as a booth fee, competitive pricing, and source of goods for sale.

Contents

A systempunkt is a point in such a system vulnerable to disruption by many small interactions, such that a swarm of disruptions and attacks will cascade through the system and collapse it, possibly resulting in financial loss, supply shortages, or destabilization.

Examples

A systempunkt may be vulnerable to operational failure, but it is not vulnerable because of its own operation or location. Rather, its operation interacts through communication, exchange or movement of objects and these disrupted dependencies of flows – of data or goods – will be the failure when it is no longer operating. The effects on the network are more significant than those on the specific object.

Computer servers that fail from a Denial of service attack may no longer support the application or user base that depends on them; this is an example of an attack on a systempunkt.

A Systempunkt attack can be related to simple sabotage. But has a more grandiose objective: collapse of a dependent network or state social order.

Sabotage deliberate action aimed at weakening another entity

Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a saboteur. Saboteurs typically try to conceal their identities because of the consequences of their actions.

A theoretical example might be if coal miners of a country went out on strike. This could cause a coal shortage which, cascading through the economy, could force a partial collapse, ultimately forcing desired major social changes. [1]

Strike action work stoppage caused by the mass refusal of employees to work

Strike action, also called labor strike, labour strike, or simply strike, is a work stoppage, caused by the mass refusal of employees to work. A strike usually takes place in response to employee grievances. Strikes became common during the Industrial Revolution, when mass labor became important in factories and mines. In most countries, strike actions were quickly made illegal, as factory owners had far more power than workers. Most Western countries partially legalized striking in the late 19th or early 20th centuries.

Etymology

The term was coined by John Robb. [2] [3]

The etymology is modern and is a portmanteau word derived from the German term 'schwerpunkt' and the English language word 'system'. The German term from Blitzkrieg warfare's schwerpunkt literally means 'heavy point' and is often translated as centre of gravity or focal point. It is used here in relation to its military context of use, in which it describes the focal point of an attack against an enemy line, usually at some vulnerable part of that line, which will lead to the collapse in the enemy line of defense. But whereas a schwerpunkt focuses on a single object of attack, the Systempunkt is representative of network effects. A link may fail, not necessarily the weakest, but the effects on the network may continue to cascade, as an avalanche effect that spreads throughout the system. Repercussions may be continuous, and exhibit repeating failures that have aftershocks for the whole network.

A portmanteau or portmanteau word is a linguistic blend of words, in which parts of multiple words or their phones (sounds) are combined into a new word, as in smog, coined by blending smoke and fog, or motel, from motor and hotel. In linguistics, a portmanteau is defined as a single morph that represents two or more morphemes.

A system is a group of interacting or interrelated entities that form a unified whole. A system is delineated by its spatial and temporal boundaries, surrounded and influenced by its environment, described by its structure and purpose and expressed in its functioning.

<i>Blitzkrieg</i> anglicised term describing a method of warfare. also known as lightning war

Blitzkrieg is a method of warfare whereby an attacking force, spearheaded by a dense concentration of armoured and motorised or mechanised infantry formations with close air support, breaks through the opponent's line of defence by short, fast, powerful attacks and then dislocates the defenders, using speed and surprise to encircle them with the help of air superiority. Through the employment of combined arms in manoeuvre warfare, blitzkrieg attempts to unbalance the enemy by making it difficult for it to respond to the continuously changing front, then defeat it in a decisive Vernichtungsschlacht.

Descriptively, systempunkt has some similarities to Heinz Guderian's adage "Nicht kleckern, klotzen!" ("Don't fiddle, smash!") though it reverses the intent and effect and intends to actualize cascading events through domino type dependencies. In practice, "Fiddle [with the systempunkt] until it [the system] smashes".

Heinz Guderian German general

Heinz Wilhelm Guderian was a German general during the Nazi era. An early pioneer and advocate of the "blitzkrieg" doctrine, he successfully led Panzer (armoured) units during the Invasion of Poland, the Battle of France, and Operation Barbarossa, the invasion of the Soviet Union.

Criticism

The concept has been criticized. [1]

Related Research Articles

Computer worm standalone malware computer program that replicates itself in order to spread to other computers

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

In security engineering, security through obscurity is the reliance on the secrecy of the design or implementation as the main method of providing security for a system or component of a system. A system or component relying on obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that if the flaws are not known, that will be sufficient to prevent a successful attack. Security experts have rejected this view as far back as 1851, and advise that obscurity should never be the only security mechanism.

Complex system system composed of many components which may interact with each other

A complex system is a system composed of many components which may interact with each other. Examples of complex systems are Earth's global climate, organisms, the human brain, infrastructure such as power grid, transportation or communication systems, social and economic organizations, an ecosystem, a living cell, and ultimately the entire universe.

Survivability is the ability to remain alive or continue to exist. The term has more specific meaning in certain contexts.

In business, a disruptive innovation is an innovation that creates a new market and value network and eventually disrupts an existing market and value network, displacing established market-leading firms, products, and alliances. The term was defined and first analyzed by the American scholar Clayton M. Christensen and his collaborators beginning in 1995, and has been called the most influential business idea of the early 21st century.

An energy crisis is any significant bottleneck in the supply of energy resources to an economy. In literature, it often refers to one of the energy sources used at a certain time and place, in particular those that supply national electricity grids or those used as fuel in vehicles.

Power outage loss of electric power to an area

A power outage is a short-term or a long-term loss of the electric power to a particular area.

Cascading failure

A cascading failure is a process in a system of interconnected parts in which the failure of one or few parts can trigger the failure of other parts and so on. Such a failure may happen in many types of systems, including power transmission, computer networking, finance, human body systems, and transportation systems.

In physics and philosophy, a relational theory is a framework to understand reality or a physical system in such a way that the positions and other properties of objects are only meaningful relative to other objects. In a relational spacetime theory, space does not exist unless there are objects in it; nor does time exist without events. The relational view proposes that space is contained in objects and that an object represents within itself relationships to other objects. Space can be defined through the relations among the objects that it contains considering their variations through time. The alternative spatial theory is an absolute theory in which the space exists independently of any objects that can be immersed in it.

In finance, systemic risk is the risk of collapse of an entire financial system or entire market, as opposed to risk associated with any one individual entity, group or component of a system, that can be contained therein without harming the entire system. It can be defined as "financial system instability, potentially catastrophic, caused or exacerbated by idiosyncratic events or conditions in financial intermediaries". It refers to the risks imposed by interlinkages and interdependencies in a system or market, where the failure of a single entity or cluster of entities can cause a cascading failure, which could potentially bankrupt or bring down the entire system or market. It is also sometimes erroneously referred to as "systematic risk".

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.

Shortage economic demand that exceeds supply

In economics, a shortage or excess demand is a situation in which the demand for a product or service exceeds its supply in a market. It is the opposite of an excess supply (surplus).

Critical infrastructure protection

Critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or nation.

In Gaussian optics, the cardinal points consist of three pairs of points located on the optical axis of a rotationally symmetric, focal, optical system. These are the focal points, the principal points, and the nodal points. For ideal systems, the basic imaging properties such as image size, location, and orientation are completely determined by the locations of the cardinal points; in fact only four points are necessary: the focal points and either the principal or nodal points. The only ideal system that has been achieved in practice is the plane mirror, however the cardinal points are widely used to approximate the behavior of real optical systems. Cardinal points provide a way to analytically simplify a system with many components, allowing the imaging characteristics of the system to be approximately determined with simple calculations.

Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. Database security is a specialist topic within the broader realms of computer security, information security and risk management.

In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset. A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. Depending on context, cyberattacks can be part of cyberwarfare or cyberterrorism. A cyberattack can be employed by nation-states, individuals, groups, society or organizations. A cyberattack may originate from an anonymous source.

Interdependent networks

The study of interdependent networks is a subfield of network science dealing with phenomena caused by the interactions between complex networks. Though there may be a wide variety of interactions between networks, dependency focuses on the scenario in which the nodes in one network require support from nodes in another network.

Counter-IED efforts

Counter-IED efforts are done primarily by military and law enforcement with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ improvised explosive devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric warfare used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED System.

Volcanic ash volcanic material formed during explosive eruptions with the diameter of the grains less than 2 mm

Volcanic ash consists of fragments of pulverized rock, minerals and volcanic glass, created during volcanic eruptions and measuring less than 2 mm (0.079 inches) in diameter. The term volcanic ash is also often loosely used to refer to all explosive eruption products, including particles larger than 2 mm. Volcanic ash is formed during explosive volcanic eruptions when dissolved gases in magma expand and escape violently into the atmosphere. The force of the escaping gas shatters the magma and propels it into the atmosphere where it solidifies into fragments of volcanic rock and glass. Ash is also produced when magma comes into contact with water during phreatomagmatic eruptions, causing the water to explosively flash to steam leading to shattering of magma. Once in the air, ash is transported by wind up to thousands of kilometers away.

References

  1. 1 2 tdaxp (October 29, 2006). "The Failure of Systempunkt Attacks". The Tdaxp Experience. Retrieved August 22, 2016.[ better source needed ]
  2. John Robb (December 19, 2004). "The Systempunkt". Global Guerrillas. Retrieved August 22, 2016.
  3. Kevin Carson (January 18, 2011). "Enforcement is the State's Systempunkt". Center for a Stateless Society. Retrieved August 22, 2016.