Security
Metaphors rooted in defense, perimeters, and adversarial thinking — firewalls, attack surfaces, trust zones, shields, locks. Spans infosec, physical security, national security, and criminology. Structurally characterized by binary distinctions (inside/outside, trusted/untrusted, safe/compromised) and the persistent tension between openness and control.
Entries (35)
- Achilles' Heel metaphor
- AI Safety Is Containment metaphor
- All Warfare Is Deception mental-model
- Attack Surface metaphor
- Big Brother Is Surveillance metaphor
- Blast Radius metaphor
- Buffer Overflow metaphor
- Cerberus metaphor
- Computer Virus Is Biological Infection metaphor
- Confused Deputy paradigm
- Cookie metaphor
- Dark Forest metaphor
- Defense in Depth metaphor
- Ecological Arms Race metaphor
- Firewall metaphor
- Guardrails metaphor
- Jailbreaking metaphor
- Lethal Trifecta paradigm
- Permission Delegation Is Genetic Inheritance metaphor
- Permissions Are Keys metaphor
- Poison Pill metaphor
- Prompt Injection metaphor
- Risk Is a Triangle paradigm
- Roles Are Theatrical Costumes metaphor
- Sandbox metaphor
- Security Is an Immune System metaphor
- Security Violations Are Trespassing metaphor
- Source and Sink Analysis paradigm
- Supply Chain Attack metaphor
- System Administration Is Feudal Lordship metaphor
- TCP Handshake metaphor
- The One Ring metaphor
- Trojan Horse metaphor
- Virus metaphor
- Zero Trust metaphor