Introduction
In the field of computer science, particularly within cybersecurity, the “Three Pillars of Security” framework, often likened to a three-legged stool, emphasises the interdependence of People, Processes, and Technology (PPT) for effective information security (Whitman and Mattord, 2018). This model underscores that no single element can sustain security alone; like a stool missing a leg, the system becomes unstable. This essay explores why relying solely on advanced technology, such as a high-end firewall, is inadequate without proper employee training (representing the People pillar). Drawing from established cybersecurity principles, it will outline the PPT framework, examine the limitations of technology in isolation, highlight the critical role of people through training, and discuss the interdependence of these pillars. By doing so, the essay demonstrates the need for a holistic approach to mitigate risks in organisational security, supported by academic sources and practical examples.
The Three Pillars of Security Framework
The Three Pillars of Security, or PPT model, is a foundational concept in information security management. It posits that robust security requires balanced attention to People (human factors), Processes (procedures and policies), and Technology (tools and systems) (Pfleeger and Pfleeger, 2015). Originating from management theories and adapted for cybersecurity, this framework is often visualised as a three-legged stool, where each leg must be sturdy for the structure to hold. For instance, Technology encompasses hardware and software like firewalls, which filter network traffic to prevent unauthorised access. However, as Whitman and Mattord (2018) argue, technology alone cannot address all vulnerabilities, particularly those arising from human error or procedural gaps. This model is widely applied in organisational settings, such as in the UK’s National Cyber Security Centre (NCSC) guidelines, which stress integrating all three elements to counter evolving threats like phishing or insider risks. Understanding this interdependence is crucial, as it reveals why isolated investments in technology often fail to deliver comprehensive protection.
The Role and Limitations of Technology in Security
Technology forms a vital pillar by providing automated defences against cyber threats. A high-end firewall, for example, uses advanced algorithms to inspect and block malicious traffic, potentially incorporating features like intrusion detection systems (IDS) and deep packet inspection (Andress, 2014). Such tools are essential in modern networks, where data breaches can result in significant financial and reputational damage. According to a report by the UK government, firewalls are a core component of perimeter security, helping to enforce access controls (Department for Digital, Culture, Media & Sport, 2020). However, technology has inherent limitations; it cannot adapt to every scenario without human oversight. Firewalls, while sophisticated, may generate false positives or require configuration adjustments that untrained users might mishandle. Furthermore, cybercriminals often exploit non-technical vectors, such as social engineering, which bypass technological barriers altogether. Thus, installing a firewall addresses only one aspect of security, leaving gaps if the other pillars are neglected. This limitation highlights the need for complementary elements, as over-reliance on technology can create a false sense of security.
The Critical Importance of People and Training
The People pillar emphasises human behaviour as both a potential weakness and strength in security systems. Employees, if untrained, can inadvertently undermine even the most advanced technologies through actions like clicking phishing links or misconfiguring settings (Pfleeger and Pfleeger, 2015). Training programmes are therefore essential, equipping staff with knowledge on recognising threats, adhering to protocols, and effectively utilising tools like firewalls. For example, without understanding how to interpret firewall alerts or update rules, employees might ignore warnings or create insecure exceptions, rendering the technology ineffective. Whitman and Mattord (2018) note that human error accounts for a significant portion of breaches, with studies showing that trained personnel reduce incident rates by fostering a security-aware culture. In a UK context, the NCSC advocates for ongoing training to address this, arguing that people must be empowered to act as the first line of defence. Indeed, without such investment, technology becomes a mere facade, vulnerable to exploitation. This pillar’s role is arguably the most dynamic, as human factors evolve with emerging threats, requiring continuous education to maintain balance in the PPT model.
Interdependence of the Pillars and Implications for Practice
The PPT framework’s strength lies in the interdependence of its components; neglecting one destabilises the others. Installing a high-end firewall without training employees exemplifies this imbalance, as untrained users may bypass or mismanage the technology, leading to breaches (Andress, 2014). Processes, such as regular audits and incident response plans, further integrate these elements, ensuring technology is used correctly. A practical example is the 2017 WannaCry ransomware attack, which exploited unpatched systems despite available technology, partly due to inadequate training and processes in affected organisations (Department for Digital, Culture, Media & Sport, 2020). This interdependence implies that organisations must adopt a holistic strategy, evaluating all pillars to identify weaknesses. Critically, while technology provides immediate safeguards, people-driven initiatives like training offer long-term resilience, addressing limitations that automated systems cannot.
Conclusion
In summary, the Three Pillars of Security framework illustrates that a high-end firewall, representing the Technology pillar, is insufficient without employee training under the People pillar, as the absence of any leg weakens the overall structure. This essay has outlined the PPT model, technology’s limitations, the necessity of training, and their interdependence, supported by evidence from key sources. The implications are clear: organisations must invest holistically to mitigate risks effectively. Failure to do so not only heightens vulnerability but also underscores the need for balanced cybersecurity strategies in an increasingly digital world. Ultimately, this approach fosters more resilient systems, protecting against both technical and human-induced threats.
References
- Andress, J. (2014) The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. 2nd edn. Syngress.
- Department for Digital, Culture, Media & Sport (2020) Cyber Security Breaches Survey 2020. UK Government.
- Pfleeger, C.P. and Pfleeger, S.L. (2015) Security in Computing. 5th edn. Prentice Hall.
- Whitman, M.E. and Mattord, H.J. (2018) Principles of Information Security. 6th edn. Cengage Learning.

