The document proposes three laws of cyber security to address ongoing issues with computer security. The first law states that checksums for files must always match the original checksum. The second law requires networks to enable verification of checksums. The third law mandates that operating systems verify checksums before running applications or system files. The goal of these three laws is to limit opportunities for computer viruses and hackers by ensuring files have not been altered from their original state.