SlideShare a Scribd company logo
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Current rules of IT Security are not a dogma, what not worksCurrent rules of IT Security are not a dogma, what not works
well, it must be changedwell, it must be changed
author : Jiří Nápravník
napravnik.jiri@salamandr.cz
People create software, computer viruses and CyberPeople create software, computer viruses and Cyber
security rulessecurity rules
People can change this !!People can change this !!
author : Jiří Nápravník
napravnik.jiri@salamandr.cz
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
● When a child wants to ride a bike, he/ she must
learn to sit, stand, walk, then hold your balance
while running and only then has the chance to
learn to ride a bicycle well.
● In the IT environment is an important initial
steps omitted. That is the
cause of persistent problems
with IT security and data
protection.
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Content :
● IT and non-IT environment
● The Three Laws of Cyber Securiry
● Analysis of the source code
● Methods for user login
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
IT and non-IT environment
– Food, toysFood, toys
● Testing food or toys for harmful substances
● ISO 7002, ISO 6541, etc.
– CarsCars
● NCAP crash tests
● ISO 16949, etc.
– SoftwareSoftware
● In SW is a lot of mistakes. “Specialist” say : It is not possible to do
otherwise.
● In the software was hidden features - http://www.eeggs.com/tree/1119.html
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
IT and non-IT environment
•
Production of Food or Cars must respect the laws of nature - biology,Production of Food or Cars must respect the laws of nature - biology,
chemistry, physics, etc.chemistry, physics, etc.
•
Creating software is only human activity which does not respect the laws ofCreating software is only human activity which does not respect the laws of
nature.nature.
✔
Quality and security software are based only on human workQuality and security software are based only on human work
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
The current state of IT security
● First, there was created the HW / SW
market, free and uncontrolled market.
After several security incidents are dealt IT
security
● How to solve security, today say authors
SW and advisors
● Cyber Security is now a business
● Authors SW claims to customers that there
is no other solution
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
The current state of IT Security
Flaw, Back Door is maybe the interest of creators and
governments
Today there is no evidence for
or against
This is a great system errorThis is a great system error
Is time to change the Cyber SecurityIs time to change the Cyber Security
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
The current state of IT Security
In fact :
● The virus can attacks the adversary system, but
can turn against its creators
● Misinformation and concealment makes it
difficult for revealing the actual attacker, and
may be accused innocent
● Revealing and description of the virus is a source
of information for other virus writers
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Corfirmation Bias
● The current solution is the only possible
● It is not possible to create better solutions
● Users are inexperienced, inattentive.They are
the greatest risk to IT
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
To whom help the change of the basics of IT and who earn on it?
• Owners, CEOs, CIOs, CSIOs, users and admins
• Confidence returns to IT
• Changes will also help authors SW
• It will also help authors of
security solutions
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security
Basis of security
for the entire
field of IT
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security
● It will be a basic control mechanism
● Compares the parameters of file from the user's computer and compares it
with the same file by the author SW
● This a new control mechanism is for all operating systems and applications.
Can check Desktop, Server, smartphone, tablet, SCADA / PLC, IoT, etc.
Can also check the firmware and all files from the upgrade.
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security
● It will be a basic check mechanism
● In the users device (PC, phone, SCADA, IoT) will not be able to install a file
that can not be verified
● In the users device can not run the application whose parts (files and/ or
libraries) can not be verified
● File that changed the virus, hacker or some other error is detected quickly
and can not be run on the device (PC, phone, SCADA, IoT, etc.)
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security
Possible objections - this solutions do not solve weaknesses in the software
(operating systems or app)
● YES. Reducing the number of weaknesses is the task for the authors SW
● TheThree Laws of Cyber security set rules to prevent editing files by a virus
or hackers
● The system, which will be useTheThree Laws of Cyber security, will be
resistant computer viruses
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Analysis of the source code
Analysis will contribute
to a sustained reduction
of weaknesses or close
backdoor in the programs
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Analysis of the source code
● Tools for searching weaknesses in source code already exist
● Tools are becoming increasingly sophisticated
● Now, in the present analysis / modernization of the source code is not
mandatory. It depends on the access of SW firms
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Analysis of the source code
● There are projects
– OWASP, etc.
● Exist commercial solutions
● Checkmarx, Klockwork,VERACODE, atd.
●
Now is not pressure on SW companies to carry out an analysis of theNow is not pressure on SW companies to carry out an analysis of the
source codesource code
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security and
Analysis of the source code
● TheThree Laws of Cyber Security ensures that in the device (PC, phone,
SCADA, IoT, etc.) will not run an infected or unknown program.
● Analysis of the source code will help improve quality of SW.This will
reduce the space through which hacker can to exploit file
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
TheThree Laws of Cyber Security and
Analysis of the source code
● The first and second level of the pyramid of ICT security remove virus
infections and hacker attacks through bugs/ vulnerabilities in the
programs.
● The next level - attack using stolen username and password
– It's a similar situation as theft and misuse of keys from an apartment or car
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Rules for users login
● In the IT environment is still talking about the fact that users use
passwords that can be easily guessed
● Human behavior is not easy to change
● Settings of server / login are easy to change
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Rules for users login
● Weak passwords
– Instead of an inexperienced user can solve the problem an experienced author and /
or the system administrator
– Creator of the system or administrator will always have more experience than a
regular user
– Creator of the system or the administrator can set restrictions that will prevent
users to use weak password
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
Rules for users login
● Example beyond IT - seat belts in the car
– Useing seat belts is uncomfortable
– Many users are reluctant to use seat belts
● Solution: automobile manufacturers in the new models use control on
seat belts. If the driver moves off without a fastened seat belts then is
heard a warning.
PYRAMID of Cyber SecurityPYRAMID of Cyber Security
1,Basis - comparing the checksums of the files in the user's device with
checksums same file from author SW
– The virus has no chance of long-term work in the user's device
2,The next level - Analysis of the source code of software, especially
operating systems
– Virus or hacker does not have a chance once-times or repeatedly abused
weaknesses in SW
3, Changed looking at user logon
– Millions of users can not be changed. A simpler is to change approach the authors
of applications like the changed approach automobile manufacturers to control
seat belts
Current rules of Cyber Security are not aCurrent rules of Cyber Security are not a
dogmadogma !!
● IT is the technical branch. Like in
mechanical or electrical engineering, it
is possible to change the outdated
solutions.
● It is therefore possible to change the
basics of the IT.
Current rules of Cyber Security are not aCurrent rules of Cyber Security are not a
dogmadogma !!
● Do you really want to change the
situation in the Cyber security?
● Support the three laws of Cyber
security and other changes associated
with it.
● Share the link of this presentation, or
email us, thank you
Current rules of Cyber Security are not aCurrent rules of Cyber Security are not a
dogmadogma !!
Thank you for your time and interest
author : Jiří Nápravník
napravnik.jiri@salamandr.cz

More Related Content

What's hot

ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
qqlan
 
Snort
SnortSnort
Snort
Rahul Jain
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
Mayur Nanotkar
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
Chong-Kuan Chen
 
malware analysis
malware  analysismalware  analysis
malware analysis
20CS201AkashR
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
Prakashchand Suthar
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
Harshit Singh Bhatia
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
العلوم الجنائية الرقمية
العلوم الجنائية الرقميةالعلوم الجنائية الرقمية
العلوم الجنائية الرقمية
facemeshfacemesh
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
mmubashirkhan
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
Paul Melson
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
Ronak Mehta
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
kalpesh1908
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
Disha Bedi
 
IPsec
IPsecIPsec

What's hot (20)

ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
 
Snort
SnortSnort
Snort
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Security threats
Security threatsSecurity threats
Security threats
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
العلوم الجنائية الرقمية
العلوم الجنائية الرقميةالعلوم الجنائية الرقمية
العلوم الجنائية الرقمية
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
IPsec
IPsecIPsec
IPsec
 

Viewers also liked

Cryptography
Cryptography Cryptography
Cryptography
Shankar Ghorpade
 
Asif
AsifAsif
Data encryption
Data encryptionData encryption
Data encryption
Balvant Biradar
 
Communication technique
Communication techniqueCommunication technique
Communication technique
japEveryday
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cryptography
CryptographyCryptography
Cryptography
Shankar Ghorpade
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
Anas Rock
 
Encryption
EncryptionEncryption
Encryption
Fiza Arslan
 
Cryptography
CryptographyCryptography
Cryptography
Sagar Janagonda
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
Mohammed Abuibaid
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
AfiqEfendy Zaen
 
CSMA/CD
CSMA/CDCSMA/CD
Encryption
EncryptionEncryption
Encryption
Nitin Parbhakar
 
DES
DESDES
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
Rashmi Burugupalli
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 

Viewers also liked (20)

Cryptography
Cryptography Cryptography
Cryptography
 
Asif
AsifAsif
Asif
 
Data encryption
Data encryptionData encryption
Data encryption
 
Communication technique
Communication techniqueCommunication technique
Communication technique
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Encryption
EncryptionEncryption
Encryption
 
DES
DESDES
DES
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Pyramid of Cyber Security

LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
Rohit Kapoor
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
Alan Tatourian
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013
Andy Bochman
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
Rohit Kapoor
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
TEKMONKS
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
Rohit Kapoor
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
Rohit Kapoor
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
Adrian Sanabria
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
NECST Lab @ Politecnico di Milano
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure product
Michael Furman
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
ERPScan
 
It's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityIt's time to change the basics of Cyber Security
It's time to change the basics of Cyber Security
Jiří Napravnik
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 

Similar to Pyramid of Cyber Security (20)

LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
System Security @ NECSTLab and Breaking the Laws of Robotics: Attacking Indus...
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure product
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
It's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityIt's time to change the basics of Cyber Security
It's time to change the basics of Cyber Security
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 

More from Jiří Napravnik

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
Jiří Napravnik
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
Jiří Napravnik
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
Jiří Napravnik
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
Jiří Napravnik
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
Jiří Napravnik
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)
Jiří Napravnik
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
Jiří Napravnik
 
The five fatal flaw in cyber security
The five fatal flaw in cyber securityThe five fatal flaw in cyber security
The five fatal flaw in cyber security
Jiří Napravnik
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
Jiří Napravnik
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
Jiří Napravnik
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
Jiří Napravnik
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
Jiří Napravnik
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
Jiří Napravnik
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
Jiří Napravnik
 

More from Jiří Napravnik (14)

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
 
The five fatal flaw in cyber security
The five fatal flaw in cyber securityThe five fatal flaw in cyber security
The five fatal flaw in cyber security
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 

Recently uploaded

Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

Pyramid of Cyber Security

  • 1. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Current rules of IT Security are not a dogma, what not worksCurrent rules of IT Security are not a dogma, what not works well, it must be changedwell, it must be changed author : Jiří Nápravník napravnik.jiri@salamandr.cz
  • 2. People create software, computer viruses and CyberPeople create software, computer viruses and Cyber security rulessecurity rules People can change this !!People can change this !! author : Jiří Nápravník napravnik.jiri@salamandr.cz
  • 3. PYRAMID of Cyber SecurityPYRAMID of Cyber Security ● When a child wants to ride a bike, he/ she must learn to sit, stand, walk, then hold your balance while running and only then has the chance to learn to ride a bicycle well. ● In the IT environment is an important initial steps omitted. That is the cause of persistent problems with IT security and data protection.
  • 4. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Content : ● IT and non-IT environment ● The Three Laws of Cyber Securiry ● Analysis of the source code ● Methods for user login
  • 5. PYRAMID of Cyber SecurityPYRAMID of Cyber Security IT and non-IT environment – Food, toysFood, toys ● Testing food or toys for harmful substances ● ISO 7002, ISO 6541, etc. – CarsCars ● NCAP crash tests ● ISO 16949, etc. – SoftwareSoftware ● In SW is a lot of mistakes. “Specialist” say : It is not possible to do otherwise. ● In the software was hidden features - http://www.eeggs.com/tree/1119.html
  • 6. PYRAMID of Cyber SecurityPYRAMID of Cyber Security IT and non-IT environment • Production of Food or Cars must respect the laws of nature - biology,Production of Food or Cars must respect the laws of nature - biology, chemistry, physics, etc.chemistry, physics, etc. • Creating software is only human activity which does not respect the laws ofCreating software is only human activity which does not respect the laws of nature.nature. ✔ Quality and security software are based only on human workQuality and security software are based only on human work
  • 7. PYRAMID of Cyber SecurityPYRAMID of Cyber Security The current state of IT security ● First, there was created the HW / SW market, free and uncontrolled market. After several security incidents are dealt IT security ● How to solve security, today say authors SW and advisors ● Cyber Security is now a business ● Authors SW claims to customers that there is no other solution
  • 8. PYRAMID of Cyber SecurityPYRAMID of Cyber Security The current state of IT Security Flaw, Back Door is maybe the interest of creators and governments Today there is no evidence for or against This is a great system errorThis is a great system error Is time to change the Cyber SecurityIs time to change the Cyber Security
  • 9. PYRAMID of Cyber SecurityPYRAMID of Cyber Security The current state of IT Security In fact : ● The virus can attacks the adversary system, but can turn against its creators ● Misinformation and concealment makes it difficult for revealing the actual attacker, and may be accused innocent ● Revealing and description of the virus is a source of information for other virus writers
  • 10. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Corfirmation Bias ● The current solution is the only possible ● It is not possible to create better solutions ● Users are inexperienced, inattentive.They are the greatest risk to IT
  • 11. PYRAMID of Cyber SecurityPYRAMID of Cyber Security To whom help the change of the basics of IT and who earn on it? • Owners, CEOs, CIOs, CSIOs, users and admins • Confidence returns to IT • Changes will also help authors SW • It will also help authors of security solutions
  • 12. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security Basis of security for the entire field of IT
  • 13. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security ● It will be a basic control mechanism ● Compares the parameters of file from the user's computer and compares it with the same file by the author SW ● This a new control mechanism is for all operating systems and applications. Can check Desktop, Server, smartphone, tablet, SCADA / PLC, IoT, etc. Can also check the firmware and all files from the upgrade.
  • 14. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security ● It will be a basic check mechanism ● In the users device (PC, phone, SCADA, IoT) will not be able to install a file that can not be verified ● In the users device can not run the application whose parts (files and/ or libraries) can not be verified ● File that changed the virus, hacker or some other error is detected quickly and can not be run on the device (PC, phone, SCADA, IoT, etc.)
  • 15. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security
  • 16. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security Possible objections - this solutions do not solve weaknesses in the software (operating systems or app) ● YES. Reducing the number of weaknesses is the task for the authors SW ● TheThree Laws of Cyber security set rules to prevent editing files by a virus or hackers ● The system, which will be useTheThree Laws of Cyber security, will be resistant computer viruses
  • 17. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Analysis of the source code Analysis will contribute to a sustained reduction of weaknesses or close backdoor in the programs
  • 18. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Analysis of the source code ● Tools for searching weaknesses in source code already exist ● Tools are becoming increasingly sophisticated ● Now, in the present analysis / modernization of the source code is not mandatory. It depends on the access of SW firms
  • 19. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Analysis of the source code ● There are projects – OWASP, etc. ● Exist commercial solutions ● Checkmarx, Klockwork,VERACODE, atd. ● Now is not pressure on SW companies to carry out an analysis of theNow is not pressure on SW companies to carry out an analysis of the source codesource code
  • 20. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security and Analysis of the source code ● TheThree Laws of Cyber Security ensures that in the device (PC, phone, SCADA, IoT, etc.) will not run an infected or unknown program. ● Analysis of the source code will help improve quality of SW.This will reduce the space through which hacker can to exploit file
  • 21. PYRAMID of Cyber SecurityPYRAMID of Cyber Security TheThree Laws of Cyber Security and Analysis of the source code ● The first and second level of the pyramid of ICT security remove virus infections and hacker attacks through bugs/ vulnerabilities in the programs. ● The next level - attack using stolen username and password – It's a similar situation as theft and misuse of keys from an apartment or car
  • 22. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Rules for users login ● In the IT environment is still talking about the fact that users use passwords that can be easily guessed ● Human behavior is not easy to change ● Settings of server / login are easy to change
  • 23. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Rules for users login ● Weak passwords – Instead of an inexperienced user can solve the problem an experienced author and / or the system administrator – Creator of the system or administrator will always have more experience than a regular user – Creator of the system or the administrator can set restrictions that will prevent users to use weak password
  • 24. PYRAMID of Cyber SecurityPYRAMID of Cyber Security Rules for users login ● Example beyond IT - seat belts in the car – Useing seat belts is uncomfortable – Many users are reluctant to use seat belts ● Solution: automobile manufacturers in the new models use control on seat belts. If the driver moves off without a fastened seat belts then is heard a warning.
  • 25. PYRAMID of Cyber SecurityPYRAMID of Cyber Security 1,Basis - comparing the checksums of the files in the user's device with checksums same file from author SW – The virus has no chance of long-term work in the user's device 2,The next level - Analysis of the source code of software, especially operating systems – Virus or hacker does not have a chance once-times or repeatedly abused weaknesses in SW 3, Changed looking at user logon – Millions of users can not be changed. A simpler is to change approach the authors of applications like the changed approach automobile manufacturers to control seat belts
  • 26. Current rules of Cyber Security are not aCurrent rules of Cyber Security are not a dogmadogma !! ● IT is the technical branch. Like in mechanical or electrical engineering, it is possible to change the outdated solutions. ● It is therefore possible to change the basics of the IT.
  • 27. Current rules of Cyber Security are not aCurrent rules of Cyber Security are not a dogmadogma !! ● Do you really want to change the situation in the Cyber security? ● Support the three laws of Cyber security and other changes associated with it. ● Share the link of this presentation, or email us, thank you
  • 28. Current rules of Cyber Security are not aCurrent rules of Cyber Security are not a dogmadogma !! Thank you for your time and interest author : Jiří Nápravník napravnik.jiri@salamandr.cz