Take a look also at the Three Laws of ICT Security.
It's time to change the basics of Cyber Security. SW is an exact discipline,
where is possible everything clearly describe, programme and test.
Users (politicians, CEOs, journalists, lawyers, etc.) tolerate the idea that is impossible create better operating systems and applications, without errors and backdoors.
In an SW environment totally lacking critical look at the work of programmers, testers, analysts.
Security Updates Matter: Exploitation for BeginnersEnergySec
Abstract: This is a presentation explaining the purposes behind why security updates should be installed on systems and why it matters to protect the bulk electric system. Many people don’t understand the full purpose of installing security updates and this presentation walks through the reasons at a very high level so that everyone can understand.
Users (politicians, CEOs, journalists, lawyers, etc.) tolerate the idea that is impossible create better operating systems and applications, without errors and backdoors.
In an SW environment totally lacking critical look at the work of programmers, testers, analysts.
Security Updates Matter: Exploitation for BeginnersEnergySec
Abstract: This is a presentation explaining the purposes behind why security updates should be installed on systems and why it matters to protect the bulk electric system. Many people don’t understand the full purpose of installing security updates and this presentation walks through the reasons at a very high level so that everyone can understand.
Threat Modeling for the Internet of ThingsEric Vétillard
A presentation made in several public events in 2015 about the threats related to the Internet of Things, and how modeling can be used as a way to manage mitigation methods.
Network Security for Automotive Embedded SystemsTonex
In the past decade, the automotive industry has undergone tremendous technological changes in terms of connectivity and personal mobility.
Modern cars are more and more like computers rather than mechanical products. It is not uncommon for modern cars to have remote connectivity and high-tech features, such as touch-sensitive dashboards, which can keep themselves up to date through regular software updates.
In the automotive industry, the consequences can be severe-if safety-related functions are compromised, it can cause injury or death, and if a large number of vehicles are threatened or required to be recalled, it can cause serious damage to reputation.
In the new digital age, due to the vehicle’s wireless communication capabilities, mobile devices (such as cellular phones or tablets connected to the vehicle via USB, Bluetooth or Wi-Fi) may have vulnerabilities inside or inside, and this problem is becoming more and more disturbing Third-party equipment connected through the vehicle diagnostic port.
Tonex's Automotive Cybersecurity Training
Automotive Cyber Security Training (Network Security for Automotive Embedded Systems) is a 3-day course. Participants will discuss the basic principles of embedded systems and the application of cyber security in vehicles to illustrate unique vulnerabilities that are commonly exploited.
Who Should Attend:
Chief Product Security Officers (CPSO)
Control Platform
Developers working with embedded systems
Embedded software engineers and testers
Ethernet and CAN Bus Software Engineers and Testers, Hardware Testers
Functional Safety Electrical Engineering
Information security professionals
Machine Learning Platform Engineers and Managers
Mechatronics Engineer, Sensor Cleaning Engineers and PMs
The Main Points of This Course Include:
Check how to adapt to network security in automotive embedded systems
The basics of automotive network security.
Automotive network security, threats, threat agents/vectors, vulnerability and risk assessment; defense in depth, etc.
Embedded system foundation
Basic knowledge of automotive embedded system product design cycle, project management, production design, V&V and O&M.
And many more.
Course Outline:
Cybersecurity Applied to Automotive
Introduction to Embedded Systems and their Applications in Automotive
Automotive Cybersecurity Strategies
Automotive Embedded System Vulnerability Analysis
Automotive Cybersecurity and Layers of Protection
Cybersecurity Best Practices for Modern Vehicles
Standards Development and Best Practices
Securing Automotive Embedded Systems Interfaces and Protocols
Cybersecurity Attacks and Best Mitigation Practices for Automotive Embedded Systems
Evaluating Cybersecurity Practices for Modern Vehicles
Learn More:
https://www.tonex.com/training-courses/automotive-cybersecurity-training-course/
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
When an industry without experience in Internet security starts connecting things to the Internet, it typically makes a number of mistakes both in how it implements secure systems, and how it interacts with the security community. With connected automobiles, the stakes for getting security right have never been higher. “What’s the worst that could happen?” is a lot more serious when you’re talking about a computer that can travel 100+ MPH.
The interest in SAP security has been growing exponentially, and not only among whitehats. SAP invests money and resources in security, provides guidelines, and arranges conferences, but, unfortunately, SAP users still pay little attention to SAP security
There are most important takeaways for CISOs to provide SAP Security for Enterprises. The presentation destroys the SAP Security myths, includes statistics obtained by ERPScan Research Group, and future trends in SAP Security.
Software occupy an increasingly prominent place in the critical embedded systems : their size and complexity is increasing , while their criticality also continues to rise. In this context, how the aeronautical, space , automotive, industrial domains are facing these challenges ? Application of international standards is essential to define the scope of practices recognized by the community as " state of the art " in terms of producing safety critical software . What are these practices, the principles on which they are built ? Starting with (re)defining the concept of software criticality and placing this concept in the whole system, then we will try to answer all these questions. During this presentation , we will illustrate the point with examples from aeronautics, air traffic control , space , automotive or railway . Finally, we will take a look at some trends , particularly through standards recently released.
This presentation examines the business case for and against penetration testing. It also includes some low hanging fruit as it relates to common security vulnerabilities.
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Dynatrace
Digital transformation drives us at Zurich North America’s (ZNA) to provide a universal desktop for insurance underwriting. The system utilizes a common SalesForce front-end to access numerous legacy applications. With high demands on performance and usability, monitoring is key but not easy. In this session we will look into what ZNA’s monitoring strategy looks like. Why we picked a layered approach including in-depth legacy application monitoring, operational monitoring of the SalesForce Lightning front-end and end-to-end business process monitoring.
Threat Modeling for the Internet of ThingsEric Vétillard
A presentation made in several public events in 2015 about the threats related to the Internet of Things, and how modeling can be used as a way to manage mitigation methods.
Network Security for Automotive Embedded SystemsTonex
In the past decade, the automotive industry has undergone tremendous technological changes in terms of connectivity and personal mobility.
Modern cars are more and more like computers rather than mechanical products. It is not uncommon for modern cars to have remote connectivity and high-tech features, such as touch-sensitive dashboards, which can keep themselves up to date through regular software updates.
In the automotive industry, the consequences can be severe-if safety-related functions are compromised, it can cause injury or death, and if a large number of vehicles are threatened or required to be recalled, it can cause serious damage to reputation.
In the new digital age, due to the vehicle’s wireless communication capabilities, mobile devices (such as cellular phones or tablets connected to the vehicle via USB, Bluetooth or Wi-Fi) may have vulnerabilities inside or inside, and this problem is becoming more and more disturbing Third-party equipment connected through the vehicle diagnostic port.
Tonex's Automotive Cybersecurity Training
Automotive Cyber Security Training (Network Security for Automotive Embedded Systems) is a 3-day course. Participants will discuss the basic principles of embedded systems and the application of cyber security in vehicles to illustrate unique vulnerabilities that are commonly exploited.
Who Should Attend:
Chief Product Security Officers (CPSO)
Control Platform
Developers working with embedded systems
Embedded software engineers and testers
Ethernet and CAN Bus Software Engineers and Testers, Hardware Testers
Functional Safety Electrical Engineering
Information security professionals
Machine Learning Platform Engineers and Managers
Mechatronics Engineer, Sensor Cleaning Engineers and PMs
The Main Points of This Course Include:
Check how to adapt to network security in automotive embedded systems
The basics of automotive network security.
Automotive network security, threats, threat agents/vectors, vulnerability and risk assessment; defense in depth, etc.
Embedded system foundation
Basic knowledge of automotive embedded system product design cycle, project management, production design, V&V and O&M.
And many more.
Course Outline:
Cybersecurity Applied to Automotive
Introduction to Embedded Systems and their Applications in Automotive
Automotive Cybersecurity Strategies
Automotive Embedded System Vulnerability Analysis
Automotive Cybersecurity and Layers of Protection
Cybersecurity Best Practices for Modern Vehicles
Standards Development and Best Practices
Securing Automotive Embedded Systems Interfaces and Protocols
Cybersecurity Attacks and Best Mitigation Practices for Automotive Embedded Systems
Evaluating Cybersecurity Practices for Modern Vehicles
Learn More:
https://www.tonex.com/training-courses/automotive-cybersecurity-training-course/
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
When an industry without experience in Internet security starts connecting things to the Internet, it typically makes a number of mistakes both in how it implements secure systems, and how it interacts with the security community. With connected automobiles, the stakes for getting security right have never been higher. “What’s the worst that could happen?” is a lot more serious when you’re talking about a computer that can travel 100+ MPH.
The interest in SAP security has been growing exponentially, and not only among whitehats. SAP invests money and resources in security, provides guidelines, and arranges conferences, but, unfortunately, SAP users still pay little attention to SAP security
There are most important takeaways for CISOs to provide SAP Security for Enterprises. The presentation destroys the SAP Security myths, includes statistics obtained by ERPScan Research Group, and future trends in SAP Security.
Software occupy an increasingly prominent place in the critical embedded systems : their size and complexity is increasing , while their criticality also continues to rise. In this context, how the aeronautical, space , automotive, industrial domains are facing these challenges ? Application of international standards is essential to define the scope of practices recognized by the community as " state of the art " in terms of producing safety critical software . What are these practices, the principles on which they are built ? Starting with (re)defining the concept of software criticality and placing this concept in the whole system, then we will try to answer all these questions. During this presentation , we will illustrate the point with examples from aeronautics, air traffic control , space , automotive or railway . Finally, we will take a look at some trends , particularly through standards recently released.
This presentation examines the business case for and against penetration testing. It also includes some low hanging fruit as it relates to common security vulnerabilities.
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Dynatrace
Digital transformation drives us at Zurich North America’s (ZNA) to provide a universal desktop for insurance underwriting. The system utilizes a common SalesForce front-end to access numerous legacy applications. With high demands on performance and usability, monitoring is key but not easy. In this session we will look into what ZNA’s monitoring strategy looks like. Why we picked a layered approach including in-depth legacy application monitoring, operational monitoring of the SalesForce Lightning front-end and end-to-end business process monitoring.
Nozomi Networks is the leader of industrial cybersecurity, delivering real-time visibility to manage cyber risk & improve resilience for industrial operations. With one solution, customers gain advanced cybersecurity, improved operational reliability & easy IT/OT integration. Innovating the use of artificial intelligence, the company helps the largest industrial sites around the world See and Secure™ their critical industrial control networks. Today Nozomi Networks supports over a quarter of a million devices in the critical infrastructure, energy, manufacturing, mining, transportation & utility sectors, making it possible to tackle the escalating cyber risks to operational networks (OT).
An introductory overview of cybersecurity covering technical and non-technical aspects of cybersecurity.
We define what is cybersecurity, we talk about risks and impacts of a cybersecurity breach and present means to avoid it both in term of regulations (Common criteria, FIPS, ...). We continue with technology and some cryptography and we finish by some fact numbers.
Presentación de la Mesa de debate 14: 'Ciberseguridad en el automóvil Autónomo y Conectado' en el 32º Encuentro de la Economía Digital y las Telecomunicaciones, Santander (3-5 septiembre 2018)
Similar to It's time to change the basics of Cyber Security (20)
Materiál k přednášce na semináři „Využití digitalizace ve veřejné správě“, zkráceně DigiVill, realizovaného v Programu INTERREG V-A Rakousko-Česká republika
Software companies and Corporate social responsibility (CSR) Jiří Napravnik
The manufacturers of toys, cars, food, etc. are responsible for their products. It is commonplace.
Software companies are not responsible for their products.
Programming is an exact discipline, where can be all procedures clearly defined, programmed and tested
5 tragických pochybeni v Cyber bezpečnostiJiří Napravnik
Pět pochybení v oboru IT a IT bezpečnosti. 15-20 let staré omyly, které mají vliv na občany a firmy i dnes. Navíc tyto omyly stály firmy již mnoho miliadr USD.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
1. napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
SW is an exact discipline,
where is possible everything clearly describe,
programme and test.
3. napravnik.jiri@salamandr.cz
The difference between the IT andThe difference between the IT and
other fieldsother fields
of human activityof human activity
➔ Security on railways – more than 130 years
➔ Aircraft safety - cca 100 years
➔ IT/ Cyber security - 20 years persistent problems
5. napravnik.jiri@salamandr.cz
The difference between the IT andThe difference between the IT and
other fieldsother fields
of human activityof human activity
Also in other fields was solutions, which was gradually
overcome.
6. napravnik.jiri@salamandr.cz
Design and programing ofDesign and programing of
computer programscomputer programs
Creating SW and/or firmware is an exact discipline,
which can be clearly defined, programmed and tested
SW Authors may not respect the physical and/ or
chemical laws, as in other fields
7. napravnik.jiri@salamandr.cz
Design and programing ofDesign and programing of
computer programscomputer programs
➔ More than 20 years of problems with computer viruses
and hacker attacks
➔ The situation is getting worse because more use of
smart phones, SCADA and IoT (Internet ofThings)
8. napravnik.jiri@salamandr.cz
The main obstacle to solving theThe main obstacle to solving the
problem of Cyber securityproblem of Cyber security
ICT "experts" say :
➔ There is no other solution
➔ The current solution is only possible
➔ You do not understand this problem
Always exist a solution, this is the
foundation of progress
10. napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
Old mechanical signal device was ruled over wire
When the wire is severed then the signal drop down, to "Stop"
Even at the time
when was used
steam locomotives
were building and
improvement
fail-safe systems
11. napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
Traffic lights
When the bulb breaks up in the green light, then the
light turns on yellow
When the bulb breaks up in the yellow light, then the
light turns on red
When the bulb breaks up in the red light, then
automatically turns on a red light at the previous signal
device
12. napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
History and progress
Outdoor security equipment is improving from 1870 to
the present. (invention Siemens und Halske)
Outdoor security equipment was and is proposed as a
fail-safe system. Thus, the fault must occur safer state.
(red light on traffic lights, the withdrawal of rail barriers,
etc.)
!!! Computers of dispatchers using the normal OS !!!
13. napravnik.jiri@salamandr.cz
Safety in the production andSafety in the production and
repair of aircraftrepair of aircraft
More than 100 year of experience and improvement
14. napravnik.jiri@salamandr.cz
False screws and other partsFalse screws and other parts
● On September 8, 1989 crashed of
a charter flight no. 394.The
airplane Convair CV-580 company
Partnair fallen off vertical tail
surfaces
● Used uncertified screws for fixing
the vertical tail surfaces
● Solutions - tightening of the
purchase and registration of spare
parts for aircraft
15. napravnik.jiri@salamandr.cz
False screws and other partsFalse screws and other parts
Revelations of fake and poor
quality parts caused many
changes in the tracking of parts
from the manufacturer to the
aircraft
● Norm EN9100 / ISO9120
● The documents
– FAA-2006-25877
– FAA FAR 21.305
● PMA ( Parts Manufacturer
Approval)
16. napravnik.jiri@salamandr.cz
Dreamliner 777 & batteryDreamliner 777 & battery
● The new Boeing 777 Dreamliner
had a problem with on-board
batteries
● In January '14 it was not allowed to
operate these aircraft
● Traffic was allowed again in April
'14 after the elimination of
problems with the on-board
batteries
19. napravnik.jiri@salamandr.cz
The contradiction between aircraft and ITThe contradiction between aircraft and IT
● Is possible to smuggle out into the operating
system strange "parts", malicious executable
file (virus)
● In the operating system is can surreptitiously
modify or alter the original "parts", a program or
library
● In the IT area is no reliable evidence and/ or
control as in aviation
20. napravnik.jiri@salamandr.cz
The contradiction between aircraft and ITThe contradiction between aircraft and IT
● Antivirus, antimalware can find only known
viruses or suspicious behavior
● This solution is not enough !!
● Proof : Stuxnet, Regin, DarkHotel, etc. and
many other viruses every day
21. napravnik.jiri@salamandr.cz
The causes of problems in the ITThe causes of problems in the IT
environmentenvironment
● PR and business were and is stronger than
voice of technicians
● Still exist blind trust to freedom of use PC and
Internet
● Users' wishes were more important than the
quality and order
22. napravnik.jiri@salamandr.cz
The causes of problems in the IT environmentThe causes of problems in the IT environment
● Antivirus looking for known problems (virus)
● Standards and norms do not define the real
basics of Cyber Security
● "Experts" said that the biggest problem are
users
24. napravnik.jiri@salamandr.cz
Not a problem on author SW side?Not a problem on author SW side?
● Creating software is a exact discipline, in
which is possible clearly describe everything
● The programmer does not need to respect the
laws of nature. Aircraft designer must
● Bugs in software are caused by poor human
work
25. napravnik.jiri@salamandr.cz
How to change it ??How to change it ??
● Basis for progress - Change is possible !!
● The next step - You want really a change ??
● Inspiration is in other fields - aerospace,
automobiles
● Security must be the basis of the system,
not an add-on
26. napravnik.jiri@salamandr.cz
Course of solving the problemCourse of solving the problem
● Checking the integrity of the programs and /
or libraries
● Control based on publicly known algorithms
● The new Internet service that ensures
comparing of control's parameters
27. napravnik.jiri@salamandr.cz
The golden ruleThe golden rule
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
Checksums of file on the user's deviceChecksums of file on the user's device
==
Checksums of file issued by author SWChecksums of file issued by author SW
29. napravnik.jiri@salamandr.cz
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
First step – definition of rulesFirst step – definition of rules
Law no. 1Law no. 1
Checksums must be always the sameChecksums must be always the same
Law no. 2Law no. 2
The network shall enable checksum verificationThe network shall enable checksum verification
Law no. 3Law no. 3
The operating system has to verify the checksumThe operating system has to verify the checksum
Another at http://rule.salamandr.czAnother at http://rule.salamandr.cz
30. napravnik.jiri@salamandr.cz
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
Second step –Second step – a new service on the Interneta new service on the Internet
Three rules define a base. ImplementationThree rules define a base. Implementation
would be in the form of a new Internetwould be in the form of a new Internet
serviceservice
Technically, it is a proven and workableTechnically, it is a proven and workable
solutionssolutions
31. napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
Inspiration :Inspiration : Traceability of parts in aviationTraceability of parts in aviation
Motto : Always exist a solution, this is the foundation
of progress
Basis rule :Basis rule :
Checksums of file on the user's deviceChecksums of file on the user's device
==
Checksums of file issued by author SWChecksums of file issued by author SW
32. napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
Jiri Napravnik
napravnik.jiri@salamandr.cz
http://rule.salamandr.cz
See also : PYRAMID of Cyber SecuritySee also : PYRAMID of Cyber Security