SlideShare a Scribd company logo
1 of 30
The five fatal The five fatal 
flawsflaws 
inin cyber security cyber security
napravnik.jiri@salamandr.cz
It's time to change the basics of Cyber Security
content
● The cost of the Cyber Security
● Users are dependent on IT
● What was gone wrong
● The five fatal flaw
● A different approach
● Three steps to resolve problems
The cost of the Cyber Security
Users, companies and State Institutions over the last
few years give tens of billions dollars into IT security
which shows how ineffectively purchase and solution
● Still similar problems and attacks are repeated
● Tha basic problems were still unresolved
● Still is not a defense against sophisticated attack
Users are dependent on IT
● Banks, trading or manufacturing
companies depend on smoothly
functioning IT
● Hacker attacks know no borders
● Sophisticated viruses can be modified
and then attack back into computers of
original author
A dangerous place PC, 
phone, etc.
● PC and viruses
– Over 25 years have not resolved problems with
viruses in PC
● Nearly 10 years we are using smart phones
– Small box, small screen
– The same problems as in a PC environment
● Problems with PC or smartphones viruses
are not resolved, and the same problems
appearing in IoT, SCADA and a cars
What was gone wrong?
● We criticize producers of food for horse
meat in meat balls, ...
● We criticizes the Volkswagen that
smoking their TDI engine
● But, we are afraid to criticize large SW
manufacturers, although programming
is a purely human work
The five fatal flaw
1) The software is still considered as a copyright
work, but still missing responsibility creators for
their work
2) Software supposedly can not be written better
3) The biggest threat for IT security are supposedly
inexperienced users
4) Are created norms, standards and laws, but does
not revise errors and backdoors in the basics of IT
5) The past 15 years grow new generation of IT
specialists who teached only "the one correct
view" to computer security
Fatal flaw no. 1
Software is viewed in the same manner as a
book or film but there is no responsibility from
the side of the author SW
● SW development is the result only of human work
● Programming is an exact discipline, where anything is
possible clearly defined, programmed and tested
● Software companies are looking for software
engineers, analysts, testers. This is similar to other
companies that develop and manufacture a product
for which they are responsible
Fatal flaw no. 1 ­ comparison 
Software is viewed as in the same manner as a
book or film but there is no responsibility from
the side of the author
● The engineers of bridges or engines must respect the
laws of nature. For example, differential expansion of
materials or chemical reaction of substances, etc.
● For drugs are examined side effects. For the human
body does not exist "manual" by which verifying what
the new substance can influence
Error no. 1  
The mistake is that ordinary users
(government officials, CEOs, lawyers,
journalists, etc.) still tolerate opinion :
Software companies do not have to
be responsible for their work
Fatal flaw no. 2
Software supposedly cannot be written better
● Each product can be improved and manufactured
better, this is the foundation of progress
● Creating software is only human work. But, authors
SW still argue that it can not be done better
Fatal flaw no. 2 ­ comparison
Software supposedly cannot be written better
● In non-IT fields are customers and control
authorities very demanding on the quality and
safety of products
● Non-IT manufacturers must emit large amounts to
applied and basic research in physics, chemistry,
etc.
Error no. 2 
Users (politicians, CEOs, journalists,
lawyers, etc.) tolerate the idea that is
impossible create better operating
systems and applications, without errors
and backdoors
Fatal flaw no. 3
For nearly 15-20 years "experts" say that
problems in IT security have been caused
by inexperiened users
● User behavior can not be changed
● 20 years excuses on inexperienced users
● It is not possible to change the behavior of all
users. Must be change SW author's access, work
and resposibility
Fatal flaw no. 3 ­ comparison
Automakers know that drivers are careless
and doing mistakes
● Automakers do not say that the problem are
inexperienced drivers, example drivers - IT
professionals
● Automakers recognize that they do not change the
behavior of drivers. So they take the initiative and
equip new cars systems which monitor driver
behavior and errors
Error no. 3 
It is a mistake, that IT professionals for
more than 15 years rely on the change
in user behavior, instead of to take the
initiative.
Similarly, as do car manufacturers.
Fatal flaw no. 4
Creating Standards, Norms, and Laws, but do not solve
errors in the basics of IT and Cyber Security
● Many people, companies and authorities devotes its energy
to creating new standards
● The same people, in next time experiencing disillusionment
after a successful sophisticated attack. Because the
standards do not prevent sophisticated attacks
● Little effort is devoted to resolve mistakes in the
basics of SW
Fatal flaw no. 4
● There are many standards for users and
administrators. Exist only little laws and standards
for authors SW anf for responibility of authors SW
● The current situation creates the false impression
that problems with viruses and hackers can be
solved with using standards and laws
● In fact, norms and laws only current solves
consequences, not the causes of problems
Error no. 4
Current norms and laws do not solves
the situation with a operating systems or
applications, as it is in the case of
aerospace (ISO 9120) or auotmotive (ISO
16949) norms
Current standards and laws solve current consequences,
but does not solve the real causes that are associated
with computer viruses and hacker attacks
Fatal flow no. 5
In the past 15 years grow new generation of IT
specialists who teached only "the one correct
view" to computer security
Single-Sided teaching are related to inaccurate views
● The authors SW supposedly can not guaranteet for their work
● Software supposedly cannot be written better
● For nearly 15-20 years "experts" say that problems in IT security have
been caused by inexperiened users
● Are creating standards, norms, and laws, but this do not solve the basic
errors in IT
Error no. 5
In an SW environment totally lacking critical look at the work
of programmers, testers, analysts. This misinformation views
also use some journalists and politicians
Training of new IT professionals in many ways reminiscent of
the education of the young generation in the Eastern Europe
bloc before 1989. At that time, the people at the East Europe
were also teached into the only one correct view on the issue
of life and the world
Correction of the problem
● Solutions exist !! This is the main and
the significant information
● Creating of software is purely a human
work, which can be clearly described,
programmed and tested.
Absolutely a different 
approach
● Apollo Program
8 years from JFK's speech to the journey of Apollo 11 to the Moon
– Resolved many new challenges
● Rocket technology
● Orientation in universe
● Protecting people and electronics from radiation
– And many discoveries from different fields of natural sciences
● Creating software - more than 15 years of unresolved issues
– The purely human work
– The exact discipline where is possible
to clearly describe all
Responsibility of the authors
● Manufacturers of children's toys, food or
household appliances are responsible for their
products
● Volkswagen is responsible for smoky TDI
engines
Solution no. 1
Creating software is purely human work. An
error in the program is the result of bad work of
authors
Must be set equally critical perspective onMust be set equally critical perspective on
software like as in area of cars, toys orsoftware like as in area of cars, toys or
foodfood
Solution no. 2
Verification of originality, origin and the integrity of
system files in PC, phone, IoT, etc.
● For solutions may be used "The three laws Cyber
Security"
● The tree laws of cyber security is a similar solution
like in aviation, where is watching spareparts from
manufacturers to installation in aircraft
Solution no. 3
● Pyramid of Cyber Security
● The verification of originality, origin and the integrity of
system files is a necessity
● Equally critical approach to cars and to software is a
necessity
the need for more changes
– It is necessary to promote regular testing software like
crash tests cars
– Authors SW must take the initiative, example
like car-makers
Summary
✔ Exist a solution for 20 years old problems with viruses and
hackers
✔ Base of solution is a change of thinking all users. Claims
for the authors of SW should be similar like demands on
the food or car manufacturer
✔ The technical part of the solution can be implemented
almost immediately. The most important
is to change the mindset and
demands of users.
Summary
● Creation of software is purely human work
● Creation of software is a exact discipline in
which everything can be clearly defined,
programmed and tested
● Changing of the basics SW can help solve the
vast majority of problems with computer
viruses and hacker attacks
About author
Jiří Nápravník (*1968)
https://cz.linkedin.com/in/napravniksalamandr
● 1997 – 2002 forensic expert, cybercrime
● 2003 - helped track down hackers - robbers bank accounts via
internet banking
● He described and tried the attack to secure electronic signature
(eSign, PKI, eIDAS)
● He described and tried the attack to chip card, with private key inside
● 2014 He defined The Three Laws of Cyber security
● 2015 He defined The Pyramid of Cyber Security

More Related Content

Similar to The five fatal flaw in cyber security

Experience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docxExperience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docxelbanglis
 
Ian_Sommerville_Software_Engineering_6th.pdf
Ian_Sommerville_Software_Engineering_6th.pdfIan_Sommerville_Software_Engineering_6th.pdf
Ian_Sommerville_Software_Engineering_6th.pdfjyotineeli1
 
2008 Exam Questions Social And Ethical
2008 Exam Questions Social And Ethical2008 Exam Questions Social And Ethical
2008 Exam Questions Social And EthicalKelly Bauer
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software EngineeringHeidi Maestas
 
Software Engineering chapter_1_5.ppt
Software Engineering chapter_1_5.pptSoftware Engineering chapter_1_5.ppt
Software Engineering chapter_1_5.pptHammad Ahmad
 
Software Engineering Paper
Software Engineering PaperSoftware Engineering Paper
Software Engineering PaperLana Sorrels
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineeringtanni821216
 
Software Engineering Unit-1
Software Engineering Unit-1Software Engineering Unit-1
Software Engineering Unit-1Samura Daniel
 
SE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxSE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxTangZhiSiang
 
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxRunning head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxjeanettehully
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSADEED AMEEN
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfbalaji984829
 
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1Siddharth Ayer
 

Similar to The five fatal flaw in cyber security (20)

Experience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docxExperience as a Computer ScientistFor this report, the pro.docx
Experience as a Computer ScientistFor this report, the pro.docx
 
Ian_Sommerville_Software_Engineering_6th.pdf
Ian_Sommerville_Software_Engineering_6th.pdfIan_Sommerville_Software_Engineering_6th.pdf
Ian_Sommerville_Software_Engineering_6th.pdf
 
software engineering ch-1
software engineering ch-1software engineering ch-1
software engineering ch-1
 
Pyramid of Cyber Security
Pyramid of Cyber SecurityPyramid of Cyber Security
Pyramid of Cyber Security
 
2008 Exam Questions Social And Ethical
2008 Exam Questions Social And Ethical2008 Exam Questions Social And Ethical
2008 Exam Questions Social And Ethical
 
Personal Note On Software Engineering
Personal Note On Software EngineeringPersonal Note On Software Engineering
Personal Note On Software Engineering
 
chapter_1_5.ppt
chapter_1_5.pptchapter_1_5.ppt
chapter_1_5.ppt
 
Software Engineering chapter_1_5.ppt
Software Engineering chapter_1_5.pptSoftware Engineering chapter_1_5.ppt
Software Engineering chapter_1_5.ppt
 
Software Engineering Paper
Software Engineering PaperSoftware Engineering Paper
Software Engineering Paper
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Webinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec ResourceWebinar - Developers Are Your Greatest AppSec Resource
Webinar - Developers Are Your Greatest AppSec Resource
 
Software Engineering Unit-1
Software Engineering Unit-1Software Engineering Unit-1
Software Engineering Unit-1
 
Lecture 1 se
Lecture 1 seLecture 1 se
Lecture 1 se
 
SE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptxSE - Lecture 1 - Introduction to S Engineering.pptx
SE - Lecture 1 - Introduction to S Engineering.pptx
 
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxRunning head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docx
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
SE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdfSE 18CS35 Module 1.pdf
SE 18CS35 Module 1.pdf
 
Chapter # 1
Chapter # 1 Chapter # 1
Chapter # 1
 
Ch1
Ch1Ch1
Ch1
 
Software Engineering - Ch1
Software Engineering - Ch1Software Engineering - Ch1
Software Engineering - Ch1
 

More from Jiří Napravnik

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíJiří Napravnik
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraJiří Napravnik
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basicsJiří Napravnik
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiJiří Napravnik
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firemJiří Napravnik
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnostiJiří Napravnik
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJiří Napravnik
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnostiJiří Napravnik
 
It's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityIt's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityJiří Napravnik
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůJiří Napravnik
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber SecurityJiří Napravnik
 

More from Jiří Napravnik (12)

Přístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcíPřístupnost a slabiny WWW stránek obcí
Přístupnost a slabiny WWW stránek obcí
 
Kyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítraKyber-bezpečnost včera, dnes a zítra
Kyber-bezpečnost včera, dnes a zítra
 
7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti7 omylu v IT bezpečnosti
7 omylu v IT bezpečnosti
 
CYBER SECURITY it is time to change the basics
CYBER SECURITY   it is time to change  the basicsCYBER SECURITY   it is time to change  the basics
CYBER SECURITY it is time to change the basics
 
Přišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnostiPřišel čas změnit základy kyber bezpečnosti
Přišel čas změnit základy kyber bezpečnosti
 
Společenská odpovědnost SW firem
Společenská odpovědnost SW firemSpolečenská odpovědnost SW firem
Společenská odpovědnost SW firem
 
5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti5 tragických pochybeni v Cyber bezpečnosti
5 tragických pochybeni v Cyber bezpečnosti
 
Je čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnostiJe čas změnit základy počítačové bezpečnosti
Je čas změnit základy počítačové bezpečnosti
 
Pyramida cyber bezpečnosti
Pyramida cyber bezpečnostiPyramida cyber bezpečnosti
Pyramida cyber bezpečnosti
 
It's time to change the basics of Cyber Security
It's time to change the basics of Cyber SecurityIt's time to change the basics of Cyber Security
It's time to change the basics of Cyber Security
 
Problémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborůProblémy ICT a zkušenosti z jiných oborů
Problémy ICT a zkušenosti z jiných oborů
 
The Three Laws of Cyber Security
The Three Laws of Cyber SecurityThe Three Laws of Cyber Security
The Three Laws of Cyber Security
 

Recently uploaded

All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 

Recently uploaded (20)

All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

The five fatal flaw in cyber security

  • 2. content ● The cost of the Cyber Security ● Users are dependent on IT ● What was gone wrong ● The five fatal flaw ● A different approach ● Three steps to resolve problems
  • 3. The cost of the Cyber Security Users, companies and State Institutions over the last few years give tens of billions dollars into IT security which shows how ineffectively purchase and solution ● Still similar problems and attacks are repeated ● Tha basic problems were still unresolved ● Still is not a defense against sophisticated attack
  • 4. Users are dependent on IT ● Banks, trading or manufacturing companies depend on smoothly functioning IT ● Hacker attacks know no borders ● Sophisticated viruses can be modified and then attack back into computers of original author
  • 5. A dangerous place PC,  phone, etc. ● PC and viruses – Over 25 years have not resolved problems with viruses in PC ● Nearly 10 years we are using smart phones – Small box, small screen – The same problems as in a PC environment ● Problems with PC or smartphones viruses are not resolved, and the same problems appearing in IoT, SCADA and a cars
  • 6. What was gone wrong? ● We criticize producers of food for horse meat in meat balls, ... ● We criticizes the Volkswagen that smoking their TDI engine ● But, we are afraid to criticize large SW manufacturers, although programming is a purely human work
  • 7. The five fatal flaw 1) The software is still considered as a copyright work, but still missing responsibility creators for their work 2) Software supposedly can not be written better 3) The biggest threat for IT security are supposedly inexperienced users 4) Are created norms, standards and laws, but does not revise errors and backdoors in the basics of IT 5) The past 15 years grow new generation of IT specialists who teached only "the one correct view" to computer security
  • 8. Fatal flaw no. 1 Software is viewed in the same manner as a book or film but there is no responsibility from the side of the author SW ● SW development is the result only of human work ● Programming is an exact discipline, where anything is possible clearly defined, programmed and tested ● Software companies are looking for software engineers, analysts, testers. This is similar to other companies that develop and manufacture a product for which they are responsible
  • 9. Fatal flaw no. 1 ­ comparison  Software is viewed as in the same manner as a book or film but there is no responsibility from the side of the author ● The engineers of bridges or engines must respect the laws of nature. For example, differential expansion of materials or chemical reaction of substances, etc. ● For drugs are examined side effects. For the human body does not exist "manual" by which verifying what the new substance can influence
  • 10. Error no. 1   The mistake is that ordinary users (government officials, CEOs, lawyers, journalists, etc.) still tolerate opinion : Software companies do not have to be responsible for their work
  • 11. Fatal flaw no. 2 Software supposedly cannot be written better ● Each product can be improved and manufactured better, this is the foundation of progress ● Creating software is only human work. But, authors SW still argue that it can not be done better
  • 12. Fatal flaw no. 2 ­ comparison Software supposedly cannot be written better ● In non-IT fields are customers and control authorities very demanding on the quality and safety of products ● Non-IT manufacturers must emit large amounts to applied and basic research in physics, chemistry, etc.
  • 13. Error no. 2  Users (politicians, CEOs, journalists, lawyers, etc.) tolerate the idea that is impossible create better operating systems and applications, without errors and backdoors
  • 14. Fatal flaw no. 3 For nearly 15-20 years "experts" say that problems in IT security have been caused by inexperiened users ● User behavior can not be changed ● 20 years excuses on inexperienced users ● It is not possible to change the behavior of all users. Must be change SW author's access, work and resposibility
  • 15. Fatal flaw no. 3 ­ comparison Automakers know that drivers are careless and doing mistakes ● Automakers do not say that the problem are inexperienced drivers, example drivers - IT professionals ● Automakers recognize that they do not change the behavior of drivers. So they take the initiative and equip new cars systems which monitor driver behavior and errors
  • 16. Error no. 3  It is a mistake, that IT professionals for more than 15 years rely on the change in user behavior, instead of to take the initiative. Similarly, as do car manufacturers.
  • 17. Fatal flaw no. 4 Creating Standards, Norms, and Laws, but do not solve errors in the basics of IT and Cyber Security ● Many people, companies and authorities devotes its energy to creating new standards ● The same people, in next time experiencing disillusionment after a successful sophisticated attack. Because the standards do not prevent sophisticated attacks ● Little effort is devoted to resolve mistakes in the basics of SW
  • 18. Fatal flaw no. 4 ● There are many standards for users and administrators. Exist only little laws and standards for authors SW anf for responibility of authors SW ● The current situation creates the false impression that problems with viruses and hackers can be solved with using standards and laws ● In fact, norms and laws only current solves consequences, not the causes of problems
  • 19. Error no. 4 Current norms and laws do not solves the situation with a operating systems or applications, as it is in the case of aerospace (ISO 9120) or auotmotive (ISO 16949) norms Current standards and laws solve current consequences, but does not solve the real causes that are associated with computer viruses and hacker attacks
  • 20. Fatal flow no. 5 In the past 15 years grow new generation of IT specialists who teached only "the one correct view" to computer security Single-Sided teaching are related to inaccurate views ● The authors SW supposedly can not guaranteet for their work ● Software supposedly cannot be written better ● For nearly 15-20 years "experts" say that problems in IT security have been caused by inexperiened users ● Are creating standards, norms, and laws, but this do not solve the basic errors in IT
  • 21. Error no. 5 In an SW environment totally lacking critical look at the work of programmers, testers, analysts. This misinformation views also use some journalists and politicians Training of new IT professionals in many ways reminiscent of the education of the young generation in the Eastern Europe bloc before 1989. At that time, the people at the East Europe were also teached into the only one correct view on the issue of life and the world
  • 22. Correction of the problem ● Solutions exist !! This is the main and the significant information ● Creating of software is purely a human work, which can be clearly described, programmed and tested.
  • 23. Absolutely a different  approach ● Apollo Program 8 years from JFK's speech to the journey of Apollo 11 to the Moon – Resolved many new challenges ● Rocket technology ● Orientation in universe ● Protecting people and electronics from radiation – And many discoveries from different fields of natural sciences ● Creating software - more than 15 years of unresolved issues – The purely human work – The exact discipline where is possible to clearly describe all
  • 24. Responsibility of the authors ● Manufacturers of children's toys, food or household appliances are responsible for their products ● Volkswagen is responsible for smoky TDI engines
  • 25. Solution no. 1 Creating software is purely human work. An error in the program is the result of bad work of authors Must be set equally critical perspective onMust be set equally critical perspective on software like as in area of cars, toys orsoftware like as in area of cars, toys or foodfood
  • 26. Solution no. 2 Verification of originality, origin and the integrity of system files in PC, phone, IoT, etc. ● For solutions may be used "The three laws Cyber Security" ● The tree laws of cyber security is a similar solution like in aviation, where is watching spareparts from manufacturers to installation in aircraft
  • 27. Solution no. 3 ● Pyramid of Cyber Security ● The verification of originality, origin and the integrity of system files is a necessity ● Equally critical approach to cars and to software is a necessity the need for more changes – It is necessary to promote regular testing software like crash tests cars – Authors SW must take the initiative, example like car-makers
  • 28. Summary ✔ Exist a solution for 20 years old problems with viruses and hackers ✔ Base of solution is a change of thinking all users. Claims for the authors of SW should be similar like demands on the food or car manufacturer ✔ The technical part of the solution can be implemented almost immediately. The most important is to change the mindset and demands of users.
  • 29. Summary ● Creation of software is purely human work ● Creation of software is a exact discipline in which everything can be clearly defined, programmed and tested ● Changing of the basics SW can help solve the vast majority of problems with computer viruses and hacker attacks
  • 30. About author Jiří Nápravník (*1968) https://cz.linkedin.com/in/napravniksalamandr ● 1997 – 2002 forensic expert, cybercrime ● 2003 - helped track down hackers - robbers bank accounts via internet banking ● He described and tried the attack to secure electronic signature (eSign, PKI, eIDAS) ● He described and tried the attack to chip card, with private key inside ● 2014 He defined The Three Laws of Cyber security ● 2015 He defined The Pyramid of Cyber Security