SlideShare ist ein Scribd-Unternehmen logo
1 von 12
The Three Laws
of Cyber Security
Foundation stone of modern Cyber security
Jiri Napravnik / http://rule.salamandr.cz
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
● Computer security was a problem for many years.
● Computer security is a big problem, which costs a lot of money
and time, but the situation continues to deteriorate.
What if the current solution built on the wrong basis ??
What if we think about the problem wrong?
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
● SW development is an exact discipline, where it is possible to
clearly describe everything, programmed and tested. No laws of
physics, no chemical reaction.
● SW development is solely the work of people.
● The error in the software is not caused by our ignorance of the
laws of nature, but a poor job of analysts, programmers and
testers.
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
Program ApolloProgram Apollo
Many scientists, technicians and workers was involved in
the project Apollo, from 1962 to 1969.
In the course of this project have been resolved many new
challenges in physics, chemistry, management of large
projects and many other areas.
In 1969, indeed the crew of Apollo 11 successfully landed
on the Moon and returned to Earth.
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
SW developmentSW development
● Creating programs are purely human activity.
● Analysts, programmers and testers in the development of
operating systems and applications do not have to respect
the physical or chemical properties of materials.
● SW Authors need not examine, understand and respect
the cosmic radiation, gravity or other natural laws like
in the Apollo program.
Is time for a change Cyber Security -
Is time for the Three Laws of Cyber Security
SW developmentSW development
Over the 15 years, since the release of Windows 2000 / XP,
failed to solve the problems with viruses.
This si a huge difference from the Apollo program.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
● In Aviation exists traceability of spare parts according to
EN 9120, FAA AC21 and next rules.
Aircraft captain has confidence that the aircraft has original
parts.
● In the ICT environment fixed point missed.
For the IT environment is propose the ThreeFor the IT environment is propose the Three
Laws of Cyber security.Laws of Cyber security.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 1 - Checksums must be always the same
Law no. 2 - The network shall enable checksum verification
Law no. 3 - The operating system has to verify the checksum
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 1 - Checksums must be always the same
The checksum of the file on the user's device must be always
the same as the checksum of the same file by the SW author.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 2 – The network shall enable checksum verification
The network has to enable checksum verification of file from
user's device with the recorded of
the checksum from SW authors.
The Three Laws of Cyber Security defines
foundation stone of modern Cyber Security
Law no. 3 – The operating system has to verify the
checksum
The operating system has to verify the checksum before
starting an application and before using unverified system files
***
Computer viruses and hackers then will have a very, veryComputer viruses and hackers then will have a very, very
limited space for the attacks.limited space for the attacks.
The Three Laws of Cyber Security definesThe Three Laws of Cyber Security defines
foundation stone of modern Cyber Securityfoundation stone of modern Cyber Security
It's time for a changeIt's time for a change
Cyber securityCyber security
Jiri NapravnikJiri Napravnik
napravnik.jiri@salamandr.cznapravnik.jiri@salamandr.cz
http://rule.salamandr.czhttp://rule.salamandr.cz

Weitere ähnliche Inhalte

Was ist angesagt?

Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidSteve Branam
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Dana Gardner
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and SecurityIMT CDL
 
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...iwatchjr
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsSecurity Innovation
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Internet google
Internet googleInternet google
Internet googleCollinwood
 

Was ist angesagt? (20)

Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
iwatchjr | Wireless Sensor Systems, Security Implications for the Industrial ...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Internet google
Internet googleInternet google
Internet google
 

Andere mochten auch

5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnostiJiří Napravnik
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůJiří Napravnik
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firemJiří Napravnik
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJiří Napravnik
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber SecurityJiří Napravnik
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnostiJiří Napravnik
 
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016Profinit
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
It's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityIt's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityJiří Napravnik
 
Corn mill machine gets good response
Corn mill machine gets good responseCorn mill machine gets good response
Corn mill machine gets good responsePenny Hou
 
1.3.1 Решения для монолитного строительства
1.3.1 Решения для монолитного строительства1.3.1 Решения для монолитного строительства
1.3.1 Решения для монолитного строительстваIgor Golovin
 
Intervento apogea marzo 2017
Intervento apogea marzo 2017Intervento apogea marzo 2017
Intervento apogea marzo 2017Davide Zucchetti
 
Tutorial wix
Tutorial wixTutorial wix
Tutorial wixjenniz
 
العملية التعليمة
العملية التعليمة العملية التعليمة
العملية التعليمة mahmoud512
 
iOSのVoiceOver対応開発
iOSのVoiceOver対応開発iOSのVoiceOver対応開発
iOSのVoiceOver対応開発Shin Ise
 
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...iXora Solution Ltd.
 
Acuerdo ministerial 6987 - Ministerio Interior
Acuerdo ministerial 6987 - Ministerio InteriorAcuerdo ministerial 6987 - Ministerio Interior
Acuerdo ministerial 6987 - Ministerio InteriorWilson Andres
 

Andere mochten auch (19)

5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
 
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
Big Data: reálné aplikace pro business - Odborna snidane 30. 11. 2016
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
It's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityIt's time to change the basics of Cyber Security
It's time to change the basics of Cyber Security
 
2017 NAEC
2017 NAEC2017 NAEC
2017 NAEC
 
Corn mill machine gets good response
Corn mill machine gets good responseCorn mill machine gets good response
Corn mill machine gets good response
 
1.3.1 Решения для монолитного строительства
1.3.1 Решения для монолитного строительства1.3.1 Решения для монолитного строительства
1.3.1 Решения для монолитного строительства
 
Intervento apogea marzo 2017
Intervento apogea marzo 2017Intervento apogea marzo 2017
Intervento apogea marzo 2017
 
ICDS1 IARIA presentation M. Hartog
ICDS1 IARIA presentation M. HartogICDS1 IARIA presentation M. Hartog
ICDS1 IARIA presentation M. Hartog
 
Tutorial wix
Tutorial wixTutorial wix
Tutorial wix
 
العملية التعليمة
العملية التعليمة العملية التعليمة
العملية التعليمة
 
iOSのVoiceOver対応開発
iOSのVoiceOver対応開発iOSのVoiceOver対応開発
iOSのVoiceOver対応開発
 
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
Office 365 Authentication Process (oAuth Service Integration) - iXora Tech Se...
 
Acuerdo ministerial 6987 - Ministerio Interior
Acuerdo ministerial 6987 - Ministerio InteriorAcuerdo ministerial 6987 - Ministerio Interior
Acuerdo ministerial 6987 - Ministerio Interior
 

Ähnlich wie The Three Laws of Cyber Security

Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsC4Media
 
The Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxThe Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxJamie Coleman
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computingijtsrd
 
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAn Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAhmed Zerouali
 
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...PROFIBUS and PROFINET InternationaI - PI UK
 
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptxWhy Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptxJamie Coleman
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Graham Smith
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...AVEVA
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 

Ähnlich wie The Three Laws of Cyber Security (20)

Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Chaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
 
The Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxThe Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptx
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
 
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAn Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
 
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
How Profisafe and cybersecurity enhance your Profinet/Profibus project - Pete...
 
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptxWhy Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
Why Building Your Ship (Application) with Raw Materials is a Bad Idea!.pptx
 
Power station monitoring and cyber security
Power station monitoring and cyber securityPower station monitoring and cyber security
Power station monitoring and cyber security
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?Are techlaw principles in the ascendancy?
Are techlaw principles in the ascendancy?
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 

Mehr von Jiří Napravnik

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíJiří Napravnik
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraJiří Napravnik
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basicsJiří Napravnik
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiJiří Napravnik
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR) Jiří Napravnik
 

Mehr von Jiří Napravnik (7)

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)
 
Pyramid of Cyber Security
Pyramid of Cyber SecurityPyramid of Cyber Security
Pyramid of Cyber Security
 

Kürzlich hochgeladen

Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingAbdi118682
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 

Kürzlich hochgeladen (20)

Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial Accounting
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 

The Three Laws of Cyber Security

  • 1. The Three Laws of Cyber Security Foundation stone of modern Cyber security Jiri Napravnik / http://rule.salamandr.cz
  • 2. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security ● Computer security was a problem for many years. ● Computer security is a big problem, which costs a lot of money and time, but the situation continues to deteriorate. What if the current solution built on the wrong basis ?? What if we think about the problem wrong?
  • 3. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security ● SW development is an exact discipline, where it is possible to clearly describe everything, programmed and tested. No laws of physics, no chemical reaction. ● SW development is solely the work of people. ● The error in the software is not caused by our ignorance of the laws of nature, but a poor job of analysts, programmers and testers.
  • 4. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security Program ApolloProgram Apollo Many scientists, technicians and workers was involved in the project Apollo, from 1962 to 1969. In the course of this project have been resolved many new challenges in physics, chemistry, management of large projects and many other areas. In 1969, indeed the crew of Apollo 11 successfully landed on the Moon and returned to Earth.
  • 5. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security SW developmentSW development ● Creating programs are purely human activity. ● Analysts, programmers and testers in the development of operating systems and applications do not have to respect the physical or chemical properties of materials. ● SW Authors need not examine, understand and respect the cosmic radiation, gravity or other natural laws like in the Apollo program.
  • 6. Is time for a change Cyber Security - Is time for the Three Laws of Cyber Security SW developmentSW development Over the 15 years, since the release of Windows 2000 / XP, failed to solve the problems with viruses. This si a huge difference from the Apollo program.
  • 7. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security ● In Aviation exists traceability of spare parts according to EN 9120, FAA AC21 and next rules. Aircraft captain has confidence that the aircraft has original parts. ● In the ICT environment fixed point missed. For the IT environment is propose the ThreeFor the IT environment is propose the Three Laws of Cyber security.Laws of Cyber security.
  • 8. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 1 - Checksums must be always the same Law no. 2 - The network shall enable checksum verification Law no. 3 - The operating system has to verify the checksum
  • 9. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 1 - Checksums must be always the same The checksum of the file on the user's device must be always the same as the checksum of the same file by the SW author.
  • 10. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 2 – The network shall enable checksum verification The network has to enable checksum verification of file from user's device with the recorded of the checksum from SW authors.
  • 11. The Three Laws of Cyber Security defines foundation stone of modern Cyber Security Law no. 3 – The operating system has to verify the checksum The operating system has to verify the checksum before starting an application and before using unverified system files *** Computer viruses and hackers then will have a very, veryComputer viruses and hackers then will have a very, very limited space for the attacks.limited space for the attacks.
  • 12. The Three Laws of Cyber Security definesThe Three Laws of Cyber Security defines foundation stone of modern Cyber Securityfoundation stone of modern Cyber Security It's time for a changeIt's time for a change Cyber securityCyber security Jiri NapravnikJiri Napravnik napravnik.jiri@salamandr.cznapravnik.jiri@salamandr.cz http://rule.salamandr.czhttp://rule.salamandr.cz