Rethinking Cybersecurity: Foundations, Trust Models, and Risk
- Arnaud Fortier

- Aug 11
- 2 min read

Beyond practical guides and manuals, cybersecurity is based on a conceptual architecture combining mathematics, social sciences, and the philosophy of technology.
A major theoretical milestone was set by Claude Shannon with informational cryptography, which demonstrates that a system can be "unconditionally secure" if the entropy of the key exceeds that of the message.
This approach continues to inspire modern protocols, even when unique keys are abandoned in favor of public-key cryptography or post-quantum mechanisms.
Cybersecurity, Trust Models and Zero-Trust Architectures
The second pillar is the notion of trust models.
In a Zero Trust architecture, trust is no longer granted by default at the perimeter but is constantly reassessed based on tangible evidence. This involves formalizing authority relationships, authentication, and integrity—often represented by trust graphs or certificate chains.


