Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Three Laws of Cyber Security

719 views

Published on

Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security

Published in: Government & Nonprofit
  • Be the first to comment

  • Be the first to like this

The Three Laws of Cyber Security

  1. 1. The Three Laws of Cyber Security Foundation stone of modern Cyber security Jiri Napravnik / http://rule.salamandr.cz
  2. 2. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security ● Computer security was a problem for many years. ● Computer security is a big problem, which costs a lot of money and time, but the situation continues to deteriorate. What if the current solution built on the wrong basis ?? What if we think about the problem wrong?
  3. 3. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security ● SW development is an exact discipline, where it is possible to clearly describe everything, programmed and tested. No laws of physics, no chemical reaction. ● SW development is solely the work of people. ● The error in the software is not caused by our ignorance of the laws of nature, but a poor job of analysts, programmers and testers.
  4. 4. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security Program ApolloProgram Apollo Many scientists, technicians and workers was involved in the project Apollo, from 1962 to 1969. In the course of this project have been resolved many new challenges in physics, chemistry, management of large projects and many other areas. In 1969, indeed the crew of Apollo 11 successfully landed on the Moon and returned to Earth.
  5. 5. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security SW developmentSW development ● Creating programs are purely human activity. ● Analysts, programmers and testers in the development of operating systems and applications do not have to respect the physical or chemical properties of materials. ● SW Authors need not examine, understand and respect the cosmic radiation, gravity or other natural laws like in the Apollo program.
  6. 6. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security SW developmentSW development Over the 15 years, since the release of Windows 2000 / XP, failed to solve the problems with viruses. This si a huge difference from the Apollo program.
  7. 7. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security ● In Aviation exists traceability of spare parts according to EN 9120, FAA AC21 and next rules. Aircraft captain has confidence that the aircraft has original parts. ● In the ICT environment fixed point missed. For the IT environment is propose the ThreeFor the IT environment is propose the Three Laws of Cyber security.Laws of Cyber security.
  8. 8. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 1 - Checksums must be always the same Law no. 2 - The network shall enable checksum verification Law no. 3 - The operating system has to verify the checksum
  9. 9. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 1 - Checksums must be always the same The checksum of the file on the user's device must be always the same as the checksum of the same file by the SW author.
  10. 10. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 2 – The network shall enable checksum verification The network has to enable checksum verification of file from user's device with the recorded of the checksum from SW authors.
  11. 11. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 3 – The operating system has to verify the checksum The operating system has to verify the checksum before starting an application and before using unverified system files *** Computer viruses and hackers then will have a very, veryComputer viruses and hackers then will have a very, very limited space for the attacks.limited space for the attacks.
  12. 12. The Three Laws of Cyber Security definesThe Three Laws of Cyber Security defines foundation stone of modern Cyber Securityfoundation stone of modern Cyber Security It's time for a changeIt's time for a change Cyber securityCyber security Jiri NapravnikJiri Napravnik napravnik.jiri@salamandr.cznapravnik.jiri@salamandr.cz http://rule.salamandr.czhttp://rule.salamandr.cz

×