SlideShare a Scribd company logo
1 of 32
napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
SW is an exact discipline,
where is possible everything clearly describe,
programme and test.
napravnik.jiri@salamandr.cz
Content of presentationContent of presentation
➔ Comparison IT with other industries
➔ Security on railways
➔ Aircraft safety
➔ IT - long-term problem
➔ Solving problems with Cyber Security
napravnik.jiri@salamandr.cz
The difference between the IT andThe difference between the IT and
other fieldsother fields
of human activityof human activity
➔ Security on railways – more than 130 years
➔ Aircraft safety - cca 100 years
➔ IT/ Cyber security - 20 years persistent problems
napravnik.jiri@salamandr.cz
A quick view at IT and comparedA quick view at IT and compared
with other industrieswith other industries
napravnik.jiri@salamandr.cz
The difference between the IT andThe difference between the IT and
other fieldsother fields
of human activityof human activity
Also in other fields was solutions, which was gradually
overcome.
napravnik.jiri@salamandr.cz
Design and programing ofDesign and programing of
computer programscomputer programs
Creating SW and/or firmware is an exact discipline,
which can be clearly defined, programmed and tested
SW Authors may not respect the physical and/ or
chemical laws, as in other fields
napravnik.jiri@salamandr.cz
Design and programing ofDesign and programing of
computer programscomputer programs
➔ More than 20 years of problems with computer viruses
and hacker attacks
➔ The situation is getting worse because more use of
smart phones, SCADA and IoT (Internet ofThings)
napravnik.jiri@salamandr.cz
The main obstacle to solving theThe main obstacle to solving the
problem of Cyber securityproblem of Cyber security
ICT "experts" say :
➔ There is no other solution
➔ The current solution is only possible
➔ You do not understand this problem
Always exist a solution, this is the
foundation of progress
napravnik.jiri@salamandr.cz
Security on railwaysSecurity on railways
More than 130 years of experience
napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
Old mechanical signal device was ruled over wire
When the wire is severed then the signal drop down, to "Stop"
Even at the time
when was used
steam locomotives
were building and
improvement
fail-safe systems
napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
Traffic lights
When the bulb breaks up in the green light, then the
light turns on yellow
When the bulb breaks up in the yellow light, then the
light turns on red
When the bulb breaks up in the red light, then
automatically turns on a red light at the previous signal
device
napravnik.jiri@salamandr.cz
The security rules on railway trafficThe security rules on railway traffic
History and progress
Outdoor security equipment is improving from 1870 to
the present. (invention Siemens und Halske)
Outdoor security equipment was and is proposed as a
fail-safe system. Thus, the fault must occur safer state.
(red light on traffic lights, the withdrawal of rail barriers,
etc.)
!!! Computers of dispatchers using the normal OS !!!
napravnik.jiri@salamandr.cz
Safety in the production andSafety in the production and
repair of aircraftrepair of aircraft
More than 100 year of experience and improvement
napravnik.jiri@salamandr.cz
False screws and other partsFalse screws and other parts
● On September 8, 1989 crashed of
a charter flight no. 394.The
airplane Convair CV-580 company
Partnair fallen off vertical tail
surfaces
● Used uncertified screws for fixing
the vertical tail surfaces
● Solutions - tightening of the
purchase and registration of spare
parts for aircraft
napravnik.jiri@salamandr.cz
False screws and other partsFalse screws and other parts
Revelations of fake and poor
quality parts caused many
changes in the tracking of parts
from the manufacturer to the
aircraft
● Norm EN9100 / ISO9120
● The documents
– FAA-2006-25877
– FAA FAR 21.305
● PMA ( Parts Manufacturer
Approval)
napravnik.jiri@salamandr.cz
Dreamliner 777 & batteryDreamliner 777 & battery
● The new Boeing 777 Dreamliner
had a problem with on-board
batteries
● In January '14 it was not allowed to
operate these aircraft
● Traffic was allowed again in April
'14 after the elimination of
problems with the on-board
batteries
napravnik.jiri@salamandr.cz
Cyber Security - long-Cyber Security - long-
term problemterm problem
napravnik.jiri@salamandr.cz
Hidden applicationsHidden applications
Operating systems were created without safety
requirements
On the http://www.eeggs.com is a list of
applications that programmers hid in operating
systems or other programs
napravnik.jiri@salamandr.cz
The contradiction between aircraft and ITThe contradiction between aircraft and IT
● Is possible to smuggle out into the operating
system strange "parts", malicious executable
file (virus)
● In the operating system is can surreptitiously
modify or alter the original "parts", a program or
library
● In the IT area is no reliable evidence and/ or
control as in aviation
napravnik.jiri@salamandr.cz
The contradiction between aircraft and ITThe contradiction between aircraft and IT
● Antivirus, antimalware can find only known
viruses or suspicious behavior
● This solution is not enough !!
● Proof : Stuxnet, Regin, DarkHotel, etc. and
many other viruses every day
napravnik.jiri@salamandr.cz
The causes of problems in the ITThe causes of problems in the IT
environmentenvironment
● PR and business were and is stronger than
voice of technicians
● Still exist blind trust to freedom of use PC and
Internet
● Users' wishes were more important than the
quality and order
napravnik.jiri@salamandr.cz
The causes of problems in the IT environmentThe causes of problems in the IT environment
● Antivirus looking for known problems (virus)
● Standards and norms do not define the real
basics of Cyber Security
● "Experts" said that the biggest problem are
users
napravnik.jiri@salamandr.cz
Not a problemNot a problem
somewhere else?somewhere else?
napravnik.jiri@salamandr.cz
Not a problem on author SW side?Not a problem on author SW side?
● Creating software is a exact discipline, in
which is possible clearly describe everything
● The programmer does not need to respect the
laws of nature. Aircraft designer must
● Bugs in software are caused by poor human
work
napravnik.jiri@salamandr.cz
How to change it ??How to change it ??
● Basis for progress - Change is possible !!
● The next step - You want really a change ??
● Inspiration is in other fields - aerospace,
automobiles
● Security must be the basis of the system,
not an add-on
napravnik.jiri@salamandr.cz
Course of solving the problemCourse of solving the problem
● Checking the integrity of the programs and /
or libraries
● Control based on publicly known algorithms
● The new Internet service that ensures
comparing of control's parameters
napravnik.jiri@salamandr.cz
The golden ruleThe golden rule
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
Checksums of file on the user's deviceChecksums of file on the user's device
==
Checksums of file issued by author SWChecksums of file issued by author SW
napravnik.jiri@salamandr.cz
The golden rule in the pictureThe golden rule in the picture
napravnik.jiri@salamandr.cz
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
First step – definition of rulesFirst step – definition of rules
Law no. 1Law no. 1
Checksums must be always the sameChecksums must be always the same
Law no. 2Law no. 2
The network shall enable checksum verificationThe network shall enable checksum verification
Law no. 3Law no. 3
The operating system has to verify the checksumThe operating system has to verify the checksum
Another at http://rule.salamandr.czAnother at http://rule.salamandr.cz
napravnik.jiri@salamandr.cz
TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security
Second step –Second step – a new service on the Interneta new service on the Internet
Three rules define a base. ImplementationThree rules define a base. Implementation
would be in the form of a new Internetwould be in the form of a new Internet
serviceservice
Technically, it is a proven and workableTechnically, it is a proven and workable
solutionssolutions
napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
Inspiration :Inspiration : Traceability of parts in aviationTraceability of parts in aviation
Motto : Always exist a solution, this is the foundation
of progress
Basis rule :Basis rule :
Checksums of file on the user's deviceChecksums of file on the user's device
==
Checksums of file issued by author SWChecksums of file issued by author SW
napravnik.jiri@salamandr.cz
It's time to change the basics ofIt's time to change the basics of
Cyber SecurityCyber Security
Jiri Napravnik
napravnik.jiri@salamandr.cz
http://rule.salamandr.cz
See also : PYRAMID of Cyber SecuritySee also : PYRAMID of Cyber Security

More Related Content

What's hot

Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 

What's hot (7)

computing
computingcomputing
computing
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile world
 

Similar to It's time to change the basics of Cyber Security

Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber SecurityJiří Napravnik
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAleksandr Timorin
 
Emerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfEmerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfssuserd973fe
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Sqreen
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopmentCISEC
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing toolsyrinxtech
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Dynatrace
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking SystemTarek Erin
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMOAMETIC
 

Similar to It's time to change the basics of Cyber Security (20)

Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
SolarWinds.pdf
SolarWinds.pdfSolarWinds.pdf
SolarWinds.pdf
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Cutting the Cord
Cutting the CordCutting the Cord
Cutting the Cord
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
 
Emerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfEmerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdf
 
Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)Tune your App Perf (and get fit for summer)
Tune your App Perf (and get fit for summer)
 
Mynd company presentation
Mynd   company presentationMynd   company presentation
Mynd company presentation
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...Zurich: Monitoring a sales force-based insurance application using dynatrace ...
Zurich: Monitoring a sales force-based insurance application using dynatrace ...
 
Csk Pp Uk
Csk Pp UkCsk Pp Uk
Csk Pp Uk
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking System
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 

More from Jiří Napravnik

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíJiří Napravnik
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraJiří Napravnik
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basicsJiří Napravnik
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiJiří Napravnik
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR) Jiří Napravnik
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firemJiří Napravnik
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnostiJiří Napravnik
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJiří Napravnik
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnostiJiří Napravnik
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůJiří Napravnik
 

More from Jiří Napravnik (11)

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
 
Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)  Software companies and Corporate social responsibility (CSR)
Software companies and Corporate social responsibility (CSR)
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
 

Recently uploaded

WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 

Recently uploaded (20)

WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 

It's time to change the basics of Cyber Security

  • 1. napravnik.jiri@salamandr.cz It's time to change the basics ofIt's time to change the basics of Cyber SecurityCyber Security SW is an exact discipline, where is possible everything clearly describe, programme and test.
  • 2. napravnik.jiri@salamandr.cz Content of presentationContent of presentation ➔ Comparison IT with other industries ➔ Security on railways ➔ Aircraft safety ➔ IT - long-term problem ➔ Solving problems with Cyber Security
  • 3. napravnik.jiri@salamandr.cz The difference between the IT andThe difference between the IT and other fieldsother fields of human activityof human activity ➔ Security on railways – more than 130 years ➔ Aircraft safety - cca 100 years ➔ IT/ Cyber security - 20 years persistent problems
  • 4. napravnik.jiri@salamandr.cz A quick view at IT and comparedA quick view at IT and compared with other industrieswith other industries
  • 5. napravnik.jiri@salamandr.cz The difference between the IT andThe difference between the IT and other fieldsother fields of human activityof human activity Also in other fields was solutions, which was gradually overcome.
  • 6. napravnik.jiri@salamandr.cz Design and programing ofDesign and programing of computer programscomputer programs Creating SW and/or firmware is an exact discipline, which can be clearly defined, programmed and tested SW Authors may not respect the physical and/ or chemical laws, as in other fields
  • 7. napravnik.jiri@salamandr.cz Design and programing ofDesign and programing of computer programscomputer programs ➔ More than 20 years of problems with computer viruses and hacker attacks ➔ The situation is getting worse because more use of smart phones, SCADA and IoT (Internet ofThings)
  • 8. napravnik.jiri@salamandr.cz The main obstacle to solving theThe main obstacle to solving the problem of Cyber securityproblem of Cyber security ICT "experts" say : ➔ There is no other solution ➔ The current solution is only possible ➔ You do not understand this problem Always exist a solution, this is the foundation of progress
  • 9. napravnik.jiri@salamandr.cz Security on railwaysSecurity on railways More than 130 years of experience
  • 10. napravnik.jiri@salamandr.cz The security rules on railway trafficThe security rules on railway traffic Old mechanical signal device was ruled over wire When the wire is severed then the signal drop down, to "Stop" Even at the time when was used steam locomotives were building and improvement fail-safe systems
  • 11. napravnik.jiri@salamandr.cz The security rules on railway trafficThe security rules on railway traffic Traffic lights When the bulb breaks up in the green light, then the light turns on yellow When the bulb breaks up in the yellow light, then the light turns on red When the bulb breaks up in the red light, then automatically turns on a red light at the previous signal device
  • 12. napravnik.jiri@salamandr.cz The security rules on railway trafficThe security rules on railway traffic History and progress Outdoor security equipment is improving from 1870 to the present. (invention Siemens und Halske) Outdoor security equipment was and is proposed as a fail-safe system. Thus, the fault must occur safer state. (red light on traffic lights, the withdrawal of rail barriers, etc.) !!! Computers of dispatchers using the normal OS !!!
  • 13. napravnik.jiri@salamandr.cz Safety in the production andSafety in the production and repair of aircraftrepair of aircraft More than 100 year of experience and improvement
  • 14. napravnik.jiri@salamandr.cz False screws and other partsFalse screws and other parts ● On September 8, 1989 crashed of a charter flight no. 394.The airplane Convair CV-580 company Partnair fallen off vertical tail surfaces ● Used uncertified screws for fixing the vertical tail surfaces ● Solutions - tightening of the purchase and registration of spare parts for aircraft
  • 15. napravnik.jiri@salamandr.cz False screws and other partsFalse screws and other parts Revelations of fake and poor quality parts caused many changes in the tracking of parts from the manufacturer to the aircraft ● Norm EN9100 / ISO9120 ● The documents – FAA-2006-25877 – FAA FAR 21.305 ● PMA ( Parts Manufacturer Approval)
  • 16. napravnik.jiri@salamandr.cz Dreamliner 777 & batteryDreamliner 777 & battery ● The new Boeing 777 Dreamliner had a problem with on-board batteries ● In January '14 it was not allowed to operate these aircraft ● Traffic was allowed again in April '14 after the elimination of problems with the on-board batteries
  • 17. napravnik.jiri@salamandr.cz Cyber Security - long-Cyber Security - long- term problemterm problem
  • 18. napravnik.jiri@salamandr.cz Hidden applicationsHidden applications Operating systems were created without safety requirements On the http://www.eeggs.com is a list of applications that programmers hid in operating systems or other programs
  • 19. napravnik.jiri@salamandr.cz The contradiction between aircraft and ITThe contradiction between aircraft and IT ● Is possible to smuggle out into the operating system strange "parts", malicious executable file (virus) ● In the operating system is can surreptitiously modify or alter the original "parts", a program or library ● In the IT area is no reliable evidence and/ or control as in aviation
  • 20. napravnik.jiri@salamandr.cz The contradiction between aircraft and ITThe contradiction between aircraft and IT ● Antivirus, antimalware can find only known viruses or suspicious behavior ● This solution is not enough !! ● Proof : Stuxnet, Regin, DarkHotel, etc. and many other viruses every day
  • 21. napravnik.jiri@salamandr.cz The causes of problems in the ITThe causes of problems in the IT environmentenvironment ● PR and business were and is stronger than voice of technicians ● Still exist blind trust to freedom of use PC and Internet ● Users' wishes were more important than the quality and order
  • 22. napravnik.jiri@salamandr.cz The causes of problems in the IT environmentThe causes of problems in the IT environment ● Antivirus looking for known problems (virus) ● Standards and norms do not define the real basics of Cyber Security ● "Experts" said that the biggest problem are users
  • 23. napravnik.jiri@salamandr.cz Not a problemNot a problem somewhere else?somewhere else?
  • 24. napravnik.jiri@salamandr.cz Not a problem on author SW side?Not a problem on author SW side? ● Creating software is a exact discipline, in which is possible clearly describe everything ● The programmer does not need to respect the laws of nature. Aircraft designer must ● Bugs in software are caused by poor human work
  • 25. napravnik.jiri@salamandr.cz How to change it ??How to change it ?? ● Basis for progress - Change is possible !! ● The next step - You want really a change ?? ● Inspiration is in other fields - aerospace, automobiles ● Security must be the basis of the system, not an add-on
  • 26. napravnik.jiri@salamandr.cz Course of solving the problemCourse of solving the problem ● Checking the integrity of the programs and / or libraries ● Control based on publicly known algorithms ● The new Internet service that ensures comparing of control's parameters
  • 27. napravnik.jiri@salamandr.cz The golden ruleThe golden rule TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security Checksums of file on the user's deviceChecksums of file on the user's device == Checksums of file issued by author SWChecksums of file issued by author SW
  • 28. napravnik.jiri@salamandr.cz The golden rule in the pictureThe golden rule in the picture
  • 29. napravnik.jiri@salamandr.cz TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security First step – definition of rulesFirst step – definition of rules Law no. 1Law no. 1 Checksums must be always the sameChecksums must be always the same Law no. 2Law no. 2 The network shall enable checksum verificationThe network shall enable checksum verification Law no. 3Law no. 3 The operating system has to verify the checksumThe operating system has to verify the checksum Another at http://rule.salamandr.czAnother at http://rule.salamandr.cz
  • 30. napravnik.jiri@salamandr.cz TheThree Laws of Cyber SecurityTheThree Laws of Cyber Security Second step –Second step – a new service on the Interneta new service on the Internet Three rules define a base. ImplementationThree rules define a base. Implementation would be in the form of a new Internetwould be in the form of a new Internet serviceservice Technically, it is a proven and workableTechnically, it is a proven and workable solutionssolutions
  • 31. napravnik.jiri@salamandr.cz It's time to change the basics ofIt's time to change the basics of Cyber SecurityCyber Security Inspiration :Inspiration : Traceability of parts in aviationTraceability of parts in aviation Motto : Always exist a solution, this is the foundation of progress Basis rule :Basis rule : Checksums of file on the user's deviceChecksums of file on the user's device == Checksums of file issued by author SWChecksums of file issued by author SW
  • 32. napravnik.jiri@salamandr.cz It's time to change the basics ofIt's time to change the basics of Cyber SecurityCyber Security Jiri Napravnik napravnik.jiri@salamandr.cz http://rule.salamandr.cz See also : PYRAMID of Cyber SecuritySee also : PYRAMID of Cyber Security