SlideShare una empresa de Scribd logo
1 de 32
napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
SW is an exact discipline,
where is possible everything clearly describe,
programme and test.
napravnik.jiri@salamandr.cz
Content of presentationContent of presentation
➔ Comparison IT with other industries
➔ Security on railways
➔ Aircraft safety
➔ IT - long-term problem
➔ Solving problems with Cyber Security
napravnik.jiri@salamandr.cz
The difference between the IT andThe difference between the IT and
other fieldsother fields
of human activityof human activity
➔ Security on railways – more than 130 years
➔ Aircraft safety - cca 100 years
➔ IT/ Cyber security - 20 years persistent problems
napravnik.jiri@salamandr.cz
A quick view at IT and comparedA quick view at IT and compared
with other industrieswith other industries
napravnik.jiri@salamandr.cz
The difference between the IT andThe difference between the IT and
other fieldsother fields
of human activityof human activity
Also in other fields was solutions, which was gradually
overcome.
napravnik.jiri@salamandr.cz
Design and programing ofDesign and programing of
computer programscomputer programs
Creating SW and/or firmware is an exact discipline,
which can be clearly defined, programmed and tested
SW Authors may not respect the physical and/ or
chemical laws, as in other fields
napravnik.jiri@salamandr.cz
Design and programing ofDesign and programing of
computer programscomputer programs
➔ More than 20 years of problems with computer viruses
and hacker attacks
➔ The situation is getting worse because more use of
smart phones, SCADA and IoT (Internet ofThings)
napravnik.jiri@salamandr.cz
The main obstacle to solving theThe main obstacle to solving the
problem of Cyber securityproblem of Cyber security
ICT "experts" say :
➔ There is no other solution
➔ The current solution is only possible
➔ You do not understand this problem
Always exist a solution, this is the
foundation of progress
napravnik.jiri@salamandr.cz
Security on railwaysSecurity on railways
More than 130 years of experience
napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
Old mechanical signal device was ruled over wire
When the wire is severed then the signal drop down, to "Stop"
Even at the time
when was used
steam locomotives
were building and
improvement
fail-safe systems
napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
Traffic lights
When the bulb breaks up in the green light, then the
light turns on yellow
When the bulb breaks up in the yellow light, then the
light turns on red
When the bulb breaks up in the red light, then
automatically turns on a red light at the previous signal
device
napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
History and progress
Outdoor security equipment is improving from 1870 to
the present. (invention Siemens und Halske)
Outdoor security equipment was and is proposed as a
fail-safe system. Thus, the fault must occur safer state.
(red light on traffic lights, the withdrawal of rail barriers,
etc.)
!!! Computers of dispatchers using the normal OS !!!
napravnik.jiri@salamandr.cz
Safety in the production andSafety in the production and
repair of aircraftrepair of aircraft
More than 100 year of experience and improvement
napravnik.jiri@salamandr.cz
False screws and other partsFalse screws and other parts
● On September 8, 1989 crashed of
a charter flight no. 394.The
airplane Convair CV-580 company
Partnair fallen off vertical tail
surfaces
● Used uncertified screws for fixing
the vertical tail surfaces
● Solutions - tightening of the
purchase and registration of spare
parts for aircraft
napravnik.jiri@salamandr.cz
False screws and other partsFalse screws and other parts
Revelations of fake and poor
quality parts caused many
changes in the tracking of parts
from the manufacturer to the
aircraft
● Norm EN9100 / ISO9120
● The documents
– FAA-2006-25877
– FAA FAR 21.305
● PMA ( Parts Manufacturer
Approval)
napravnik.jiri@salamandr.cz
Dreamliner 777 & batteryDreamliner 777 & battery
● The new Boeing 777 Dreamliner
had a problem with on-board
batteries
● In January '14 it was not allowed to
operate these aircraft
● Traffic was allowed again in April
'14 after the elimination of
problems with the on-board
batteries
napravnik.jiri@salamandr.cz
Cyber Security - long-Cyber Security - long-
term problemterm problem
napravnik.jiri@salamandr.cz
Hidden applicationsHidden applications
Operating systems were created without safety
requirements
On the http://www.eeggs.com is a list of
applications that programmers hid in operating
systems or other programs
napravnik.jiri@salamandr.cz
The contradiction between aircraft and ITThe contradiction between aircraft and IT
● Is possible to smuggle out into the operating
system strange "parts", malicious executable
file (virus)
● In the operating system is can surreptitiously
modify or alter the original "parts", a program or
library
● In the IT area is no reliable evidence and/ or
control as in aviation
napravnik.jiri@salamandr.cz
The contradiction between aircraft and ITThe contradiction between aircraft and IT
● Antivirus, antimalware can find only known
viruses or suspicious behavior
● This solution is not enough !!
● Proof : Stuxnet, Regin, DarkHotel, etc. and
many other viruses every day
napravnik.jiri@salamandr.cz
The causes of problems in the ITThe causes of problems in the IT
environmentenvironment
● PR and business were and is stronger than
voice of technicians
● Still exist blind trust to freedom of use PC and
Internet
● Users' wishes were more important than the
quality and order
napravnik.jiri@salamandr.cz
The causes of problems in the IT environmentThe causes of problems in the IT environment
● Antivirus looking for known problems (virus)
● Standards and norms do not define the real
basics of Cyber Security
● "Experts" said that the biggest problem are
users
napravnik.jiri@salamandr.cz
Not a problemNot a problem
somewhere else?somewhere else?
napravnik.jiri@salamandr.cz
Not a problem on author SW side?Not a problem on author SW side?
● Creating software is a exact discipline, in
which is possible clearly describe everything
● The programmer does not need to respect the
laws of nature. Aircraft designer must
● Bugs in software are caused by poor human
work
napravnik.jiri@salamandr.cz
How to change it ??How to change it ??
● Basis for progress - Change is possible !!
● The next step - You want really a change ??
● Inspiration is in other fields - aerospace,
automobiles
● Security must be the basis of the system,
not an add-on
napravnik.jiri@salamandr.cz
Course of solving the problemCourse of solving the problem
● Checking the integrity of the programs and /
or libraries
● Control based on publicly known algorithms
● The new Internet service that ensures
comparing of control's parameters
napravnik.jiri@salamandr.cz
The golden ruleThe golden rule
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
Checksums of file on the user's deviceChecksums of file on the user's device
==
Checksums of file issued by author SWChecksums of file issued by author SW
napravnik.jiri@salamandr.cz
The golden rule in the pictureThe golden rule in the picture
napravnik.jiri@salamandr.cz
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
First step – definition of rulesFirst step – definition of rules
Law no. 1Law no. 1
Checksums must be always the sameChecksums must be always the same
Law no. 2Law no. 2
The network shall enable checksum verificationThe network shall enable checksum verification
Law no. 3Law no. 3
The operating system has to verify the checksumThe operating system has to verify the checksum
Another at http://rule.salamandr.czAnother at http://rule.salamandr.cz
napravnik.jiri@salamandr.cz
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
Second step –Second step – a new service on the Interneta new service on the Internet
Three rules define a base. ImplementationThree rules define a base. Implementation
would be in the form of a new Internetwould be in the form of a new Internet
serviceservice
Technically, it is a proven and workableTechnically, it is a proven and workable
solutionssolutions
napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
Inspiration :Inspiration : Traceability of parts in aviationTraceability of parts in aviation
Motto : Always exist a solution, this is the foundation
of progress
Basis rule :Basis rule :
Checksums of file on the user's deviceChecksums of file on the user's device
==
Checksums of file issued by author SWChecksums of file issued by author SW
napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
Jiri Napravnik
napravnik.jiri@salamandr.cz
http://rule.salamandr.cz
See also : PYRAMID of Cyber SecuritySee also : PYRAMID of Cyber Security

Más contenido relacionado

La actualidad más candente

Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 

La actualidad más candente (7)

computing
computingcomputing
computing
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile world
 

Similar a It's time to change the basics of Cyber Security

Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAleksandr Timorin
 
Emerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfEmerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfssuserd973fe
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Sqreen
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopmentCISEC
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing toolsyrinxtech
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Dynatrace
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking SystemTarek Erin
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMOAMETIC
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 

Similar a It's time to change the basics of Cyber Security (20)

Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
SolarWinds.pdf
SolarWinds.pdfSolarWinds.pdf
SolarWinds.pdf
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Cutting the Cord
Cutting the CordCutting the Cord
Cutting the Cord
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
 
Emerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfEmerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdf
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)
 
Mynd company presentation
Mynd   company presentationMynd   company presentation
Mynd company presentation
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
 
Csk Pp Uk
Csk Pp UkCsk Pp Uk
Csk Pp Uk
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking System
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 

Más de Jiří Napravnik

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíJiří Napravnik
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraJiří Napravnik
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basicsJiří Napravnik
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiJiří Napravnik
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR) Jiří Napravnik
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firemJiří Napravnik
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnostiJiří Napravnik
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJiří Napravnik
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnostiJiří Napravnik
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůJiří Napravnik
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber SecurityJiří Napravnik
 

Más de Jiří Napravnik (12)

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 

Último

一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...Sareena Khatun
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfbhavenpr
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
The Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceThe Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceBridgeWest.eu
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样doypbe
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 

Último (20)

一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
The Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in GreeceThe Main Procedures for a Divorce in Greece
The Main Procedures for a Divorce in Greece
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
一比一原版(UW毕业证书)西雅图华盛顿大学毕业证原件一模一样
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 

It's time to change the basics of Cyber Security

  • 1. napravnik.jiri@salamandr.cz It's time to change the basics ofIt's time to change the basics of Cyber SecurityCyber Security SW is an exact discipline, where is possible everything clearly describe, programme and test.
  • 2. napravnik.jiri@salamandr.cz Content of presentationContent of presentation ➔ Comparison IT with other industries ➔ Security on railways ➔ Aircraft safety ➔ IT - long-term problem ➔ Solving problems with Cyber Security
  • 3. napravnik.jiri@salamandr.cz The difference between the IT andThe difference between the IT and other fieldsother fields of human activityof human activity ➔ Security on railways – more than 130 years ➔ Aircraft safety - cca 100 years ➔ IT/ Cyber security - 20 years persistent problems
  • 4. napravnik.jiri@salamandr.cz A quick view at IT and comparedA quick view at IT and compared with other industrieswith other industries
  • 5. napravnik.jiri@salamandr.cz The difference between the IT andThe difference between the IT and other fieldsother fields of human activityof human activity Also in other fields was solutions, which was gradually overcome.
  • 6. napravnik.jiri@salamandr.cz Design and programing ofDesign and programing of computer programscomputer programs Creating SW and/or firmware is an exact discipline, which can be clearly defined, programmed and tested SW Authors may not respect the physical and/ or chemical laws, as in other fields
  • 7. napravnik.jiri@salamandr.cz Design and programing ofDesign and programing of computer programscomputer programs ➔ More than 20 years of problems with computer viruses and hacker attacks ➔ The situation is getting worse because more use of smart phones, SCADA and IoT (Internet ofThings)
  • 8. napravnik.jiri@salamandr.cz The main obstacle to solving theThe main obstacle to solving the problem of Cyber securityproblem of Cyber security ICT "experts" say : ➔ There is no other solution ➔ The current solution is only possible ➔ You do not understand this problem Always exist a solution, this is the foundation of progress
  • 9. napravnik.jiri@salamandr.cz Security on railwaysSecurity on railways More than 130 years of experience
  • 10. napravnik.jiri@salamandr.cz The security rules on railway trafficThe security rules on railway traffic Old mechanical signal device was ruled over wire When the wire is severed then the signal drop down, to "Stop" Even at the time when was used steam locomotives were building and improvement fail-safe systems
  • 11. napravnik.jiri@salamandr.cz The security rules on railway trafficThe security rules on railway traffic Traffic lights When the bulb breaks up in the green light, then the light turns on yellow When the bulb breaks up in the yellow light, then the light turns on red When the bulb breaks up in the red light, then automatically turns on a red light at the previous signal device
  • 12. napravnik.jiri@salamandr.cz The security rules on railway trafficThe security rules on railway traffic History and progress Outdoor security equipment is improving from 1870 to the present. (invention Siemens und Halske) Outdoor security equipment was and is proposed as a fail-safe system. Thus, the fault must occur safer state. (red light on traffic lights, the withdrawal of rail barriers, etc.) !!! Computers of dispatchers using the normal OS !!!
  • 13. napravnik.jiri@salamandr.cz Safety in the production andSafety in the production and repair of aircraftrepair of aircraft More than 100 year of experience and improvement
  • 14. napravnik.jiri@salamandr.cz False screws and other partsFalse screws and other parts ● On September 8, 1989 crashed of a charter flight no. 394.The airplane Convair CV-580 company Partnair fallen off vertical tail surfaces ● Used uncertified screws for fixing the vertical tail surfaces ● Solutions - tightening of the purchase and registration of spare parts for aircraft
  • 15. napravnik.jiri@salamandr.cz False screws and other partsFalse screws and other parts Revelations of fake and poor quality parts caused many changes in the tracking of parts from the manufacturer to the aircraft ● Norm EN9100 / ISO9120 ● The documents – FAA-2006-25877 – FAA FAR 21.305 ● PMA ( Parts Manufacturer Approval)
  • 16. napravnik.jiri@salamandr.cz Dreamliner 777 & batteryDreamliner 777 & battery ● The new Boeing 777 Dreamliner had a problem with on-board batteries ● In January '14 it was not allowed to operate these aircraft ● Traffic was allowed again in April '14 after the elimination of problems with the on-board batteries
  • 17. napravnik.jiri@salamandr.cz Cyber Security - long-Cyber Security - long- term problemterm problem
  • 18. napravnik.jiri@salamandr.cz Hidden applicationsHidden applications Operating systems were created without safety requirements On the http://www.eeggs.com is a list of applications that programmers hid in operating systems or other programs
  • 19. napravnik.jiri@salamandr.cz The contradiction between aircraft and ITThe contradiction between aircraft and IT ● Is possible to smuggle out into the operating system strange "parts", malicious executable file (virus) ● In the operating system is can surreptitiously modify or alter the original "parts", a program or library ● In the IT area is no reliable evidence and/ or control as in aviation
  • 20. napravnik.jiri@salamandr.cz The contradiction between aircraft and ITThe contradiction between aircraft and IT ● Antivirus, antimalware can find only known viruses or suspicious behavior ● This solution is not enough !! ● Proof : Stuxnet, Regin, DarkHotel, etc. and many other viruses every day
  • 21. napravnik.jiri@salamandr.cz The causes of problems in the ITThe causes of problems in the IT environmentenvironment ● PR and business were and is stronger than voice of technicians ● Still exist blind trust to freedom of use PC and Internet ● Users' wishes were more important than the quality and order
  • 22. napravnik.jiri@salamandr.cz The causes of problems in the IT environmentThe causes of problems in the IT environment ● Antivirus looking for known problems (virus) ● Standards and norms do not define the real basics of Cyber Security ● "Experts" said that the biggest problem are users
  • 23. napravnik.jiri@salamandr.cz Not a problemNot a problem somewhere else?somewhere else?
  • 24. napravnik.jiri@salamandr.cz Not a problem on author SW side?Not a problem on author SW side? ● Creating software is a exact discipline, in which is possible clearly describe everything ● The programmer does not need to respect the laws of nature. Aircraft designer must ● Bugs in software are caused by poor human work
  • 25. napravnik.jiri@salamandr.cz How to change it ??How to change it ?? ● Basis for progress - Change is possible !! ● The next step - You want really a change ?? ● Inspiration is in other fields - aerospace, automobiles ● Security must be the basis of the system, not an add-on
  • 26. napravnik.jiri@salamandr.cz Course of solving the problemCourse of solving the problem ● Checking the integrity of the programs and / or libraries ● Control based on publicly known algorithms ● The new Internet service that ensures comparing of control's parameters
  • 27. napravnik.jiri@salamandr.cz The golden ruleThe golden rule TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security Checksums of file on the user's deviceChecksums of file on the user's device == Checksums of file issued by author SWChecksums of file issued by author SW
  • 28. napravnik.jiri@salamandr.cz The golden rule in the pictureThe golden rule in the picture
  • 29. napravnik.jiri@salamandr.cz TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security First step – definition of rulesFirst step – definition of rules Law no. 1Law no. 1 Checksums must be always the sameChecksums must be always the same Law no. 2Law no. 2 The network shall enable checksum verificationThe network shall enable checksum verification Law no. 3Law no. 3 The operating system has to verify the checksumThe operating system has to verify the checksum Another at http://rule.salamandr.czAnother at http://rule.salamandr.cz
  • 30. napravnik.jiri@salamandr.cz TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security Second step –Second step – a new service on the Interneta new service on the Internet Three rules define a base. ImplementationThree rules define a base. Implementation would be in the form of a new Internetwould be in the form of a new Internet serviceservice Technically, it is a proven and workableTechnically, it is a proven and workable solutionssolutions
  • 31. napravnik.jiri@salamandr.cz It's time to change the basics ofIt's time to change the basics of Cyber SecurityCyber Security Inspiration :Inspiration : Traceability of parts in aviationTraceability of parts in aviation Motto : Always exist a solution, this is the foundation of progress Basis rule :Basis rule : Checksums of file on the user's deviceChecksums of file on the user's device == Checksums of file issued by author SWChecksums of file issued by author SW
  • 32. napravnik.jiri@salamandr.cz It's time to change the basics ofIt's time to change the basics of Cyber SecurityCyber Security Jiri Napravnik napravnik.jiri@salamandr.cz http://rule.salamandr.cz See also : PYRAMID of Cyber SecuritySee also : PYRAMID of Cyber Security