Understanding Cyber Technologies in a Physical Way

In this paper


THE CORRELATION BETWEEN CYBER DEFENSE AND DIGITAL TECHNOLOGIES
Cyber technologies would include computers, web and mobile systems commonly being correlated with the digital circuitries. As everyone would knowthe computer and many networks would deal with the 0s and 1s making such electronics binary. In general, digital technologies would use the system of switching indicating that the state is 0 when a switch is normally opened or state is 1 when the switch is regularly closed. Those are how it works in a theory, but let's try to deal with the practice. The practice would invoke much nonlinearity which would make things a bit complicated. For instance, the voltage being linked with the 0 would have many disturbances and it would usually take the values between 0 and 2 V. On the other hands, the logical 1 would also get a noisy signal and oscillate within a range including 3 and 5 V [1][2][3][4][5][6].
So, that's how we would introduce digital systems being made from electronic components such as resistors, transistors, diodes, capacitors and much more. All these components are somehow reliable within the certain spectrum of physical variables. For instance, much military digital equipment could handle a very cold weather and also work properly at a quite hot climate condition. systems is they could get infected with some malware which could put them into cycle or cause a thermal heat raising the voltage on. Practically, this would indicate that all systems dealing with 0s and 1s could potentially get vulnerable in cyber defense sense.
Many hackers would know this and they would try to exploit such vulnerabilities developing and using the sophisticated cyber weapons that would cause harm to digital system in hardware manner. The fact is that some skillfully prepared malicious codes could do a damage of hardware components simply putting the system into a repeating condition or increasing the voltage to those circuits [7][8][9][10][11][12][13][14], [19][20][21][22][23].
The quite good recommendation here could be that the circuitry should be better designed attempting to connect the entire system with the ground in case of electrical shock. Also, we would suggest that material science could make more researches trying to discover the materials which could take more extreme conditions. Also, the good correlation between cyber defense and digital systems could be that all digital systems are potentially hackable, so that's why it's so significant to protect them from cyber harm.
Finally, we would be aware that digital circuits wouldin a practicegetcorrelated with the printed boards or some micro-chips and mainly created using silicon and applying the special techniques of packaging offering an opportunity to put more electronic components in a very small size of area. Luckily, silicon is still with the suitable price for a reason it could get easily available from sand in the deserts worldwide [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18].

HOW DIGITAL SYSTEMS CORRESPOND TO PHYSICAL REALITY
Digital systems are so abstract mainly corre-sponding to mathematics, rather than a physical world. They are so simple to get made for a reason of using lots of resistors, capacitors, diodes, transistors and many other similar electronic elements. In a mathematical scriptit so common to deal with many 0s and 1s trying to describe a digital signal, but in a reality there would be a certain spectrum of voltages and currents which should get satisfied. As we said before, some electronic elements are more or less sensitive to a voltage rise. For instance, resistors and diodes are especially vulnerable if voltage goes high for the reason of their currentvoltage characteristic curves suggesting that quite small voltages could cause a breakdown which means the current would go exponentially up like in the case of short circuit phenomenon [19][20][21][22][23][24][25]. Through this effort we intend to illustrate some digital circuit's examples in order to discuss better what their weaknesses could be. Such an example would be given in a Figure 1.

Figure 1 -The example of digital circuitry
As it's given in the Figure abovein digital electronics, we can deal with the logic gates being AND, OR, NOT, XOR and so on or with the integrated circuits (ICs) which could offer many connectors. The logic gates could be made out of diodes, resistors and transistors, while the ICs are something like chips using the special techniques of packaging on a small piece of area. In a practice, it's so important to do a good design of these circuits paying so much attention on security and safety of your work. Sometimes it's sufficient to connect your effort with the ground to make it safe and so commonly you would need to use the micro-relays to provide a certain level of security to the entire system. At the beginning, we would suggest that in case of the voltage increasesome sensitive elements such as resistors and especially diodes could suffer the thermal heat and simply deal as a short circuit to the entire printed board. The short circuit means that the current would get extremely high andby Jules lawproduce the big heat that would burn the entire element and cause hardware harm to that digital technology. Next, we would represent the SR flip-flop and explain some weaknesses of that memory's device [26][27][28][29]. The illustration is given in a Figure 2.

Figure 2 -The SR flip-flop
As it's known, the flip-flops are quite reliable memory elements that would operate in a stable manner in many cases. For instance, the SR latch would remember the state being brought to its entry and so successfully deal with the nearly all inputs. The case when this memory device may get confused is when a 1 is brought to the both inputsset (S) and reset (R). In such a case, the output state would get undefined and the entire flip-flop would begin oscillating or, in other wordsworking in a quite unstable way. If such a memory element would get put in the repeating conditions making its inputs cause the instability at the outputthe entire memory section would start oscillating and potentially some valuable data could be lost. The best way to protect such memory elements from harm could be to apply more secure methods of a board's design. Many experts would agree that hardware as well as software could be concerning from a perspective of the user's experience. Here, we have mentioned some hardware damages usually being so non-repairable andin addition, we would mention that those sorts of concerns could easily be the consequence of skillfully prepared hacker's attacks which would cause a damage of the entire hardware simply putting a malware into a computer.

WHAT ARE THE LIMITATIONS OF CYBER TECHNOLOGIES?
Digital technologies on the paper and digital technologies in a reality could be somehow different. TEHNIKA -KVALITET IMS, STANDARDIZACIJA I METROLOGIJA 21 (2021) 5 Those on the paper would strongly rely on mathematics which would bring a certain level of perfection, while those in a reality would cope with a physical imperfection dealing with nonlinearities and many other limitations of the nature. The fact is our nature being so balanced and symmetric on a one side and so beautiful on another side is still quite limited and with lots of boundaries. Cyber technologies would like many technical systems get their warranties promising how long they can work, what they can take and how they can be fixed in case of damage. Also, cyber systems relying on digital technologies would easily get hacked, so it's significant to take care about their security from the both aspectssoftware and hardware. Many would describe mathematics as a God's science and our physical reality would be somehow similar to the projection of that science into a real world which would still have flaws putting aside all perfections that such an abstract creation of mind gave us [30][31].
Through this effort, we would mention that material science and engineering could play a big role into creating more superior digital systems. Simply, try to imagine a material with much better performances being used for a production of electronics pieces. As it's known, digital technologies would assume lots of electronics and use power supplies to their work. So interestingly, these systems would consume electricity to their operation and as everything working on electricitythey would deal with some sort of electromagnetic field being typical to electronics systems. For instance, for such a reason -it's not recommended to let electrical and electronic devices work during the thunderstorm because they could so easily attract the flesh and suffer their complete damage as well as put at risk people being close to them. Finally, cyber technologies are still so new with the history of the human kind and could illustrate some sort of the great technological revolution bringing us the bothgood and bad thingsto deal with.

DISCUSSIONS
The point of this paper would be to suggest how cyber defense could be correlated with the digital systems. As we would see through the previous sections, digital systems would so commonly use some sort of electricity source and deal with the current and voltage. That's how the binary digits being 0s and 1s would be representedusing the certain level of the voltage. If anyone amplifies such a voltagemany electronic elements could suffer the breakdown and the entire system could deal with the non-repairable damage. Also, there would be the risk of repeating condition that could put many memory devices into the undefined state. In total, it's all about the smart design and intelligent selection of materials which would be used to make a circuit. Finally, we would recommend that the ongoing science and technologies could go deeper and bring us many new advancements as well as progressive ideas and solutions.

CONCLUSIONS
The aim of this effort has been to provide a better perspective to cyber technologies as something having the strong basis in a reality. Hope we would motivate more researchers' community which would give its effort in finding answers to many questions. Above all, this effort could bring a good insight how cyber defense would be understanded in a practiceat a micro-level.