The basic contradiction

The designers of planes, trains or automobiles must respect the laws of nature, such as expansion or friction materials, chemical reaction of various materials, the quality and intensity of burning.

In contrast, production of computer programs is only human work, which does not respect the laws of nature. Bug in the operating system and other programs is not caused by our ignorance of the laws of nature, but it is a consequence of the bad work of analysts, programmers and testers.

 

Are you troubled Cyber security?
You cannot understand why these problems have not been solved a long time ago? You are looking for answers ??  You are in the right place.

The Three Laws of Cyber Security that solve the problem of computer viruses.
It's a real chance to eliminate viruses, DDoS or hacking attacks

The Three Laws of  Cyber Security is a workable solution


 

The Three Laws of Cyber Security -  The shift from the search for already known viruses to the solution which verifies the originality of origin (integrity).

The approach is very similar to the verification of original spare parts for aircraft.


Operating systems were originally developed as a basis for running simple office applications such as "smart typewriter" - text editor Word, AmiPro, etc. This view is the basis of today's problems with Cyber security. In about 2000, the situation began to change dramatically. Computers, computer networks and the Internet spread rapidly, but did not change the basics of Cyber security.
Today are many business sectors vitally dependent on computers. For example, banks, malls and wholesalers today could hardly offer their services without computers and computer networks.
Without computers and the Internet e-shops would not exist or for example the design of new products and the subsequent preparation for production of these products (CAD / CAM) would take far longer.

  Operating systems and other applications were created and developed without control rules and obligations. Although there have been many standards (eg. ISO 2700x) or even laws, but even these laws do not address the basics of problems in ICT.
Huge shortage of these standards and laws is that it looks at the computer program as a thing that can not be changed or somehow controlled. Authors says a better solution not exists.

  Another pitfall is that around the entire field of ICT was the creation of an extraordinary atmosphere where logical rules from other fields are ignored.


Infact, the deveopment of computer programs is a  normal human activity. Certainly the need for knowledge of programming languages, but it is nothing extraordinary. Designing a building or a gearbox are also require special knowledge.


  Software development is an exact discipline which can be described accurately. Despite this ICT security has been for months if not years going round in circles. There are new security programs that react to things which have happened in the past. The situation has worsened and has spread to equipment which could be the target of attacks. These attacks are no longer focused on Pcs but further targets are smart phones, SCADA/PLC systems, IoT.

  Software development is an exact science.  In the area of development and testing of software, it is necessary to describe the procedures and functions clearly. It is necessary to describe the output of SW modules or the whole application. By using clear descriptions it is possible to test in an easy manner.

 

In an environment based on a clear description of the tasks can be implemented a clear control

 

When we want to defend ourselves against computer viruses we must protect system's files (operating systems, drivers and other applications) against modification. When we prevent the system from running unknown and unsafe files  therefore we remove the space where computer viruses and hackers can cause damage.

  This is a very simple. Will be significantly fewer or disappear computer viruses and reduce the space for hackers. This solution will be beneficial for everybody. The average user will not live in fear that his/her computer is infected, system administrators will have less conerns with the strange behaviour of user equipment and servers and companies which are focused on ICT Security will be able to concentrate on real security threats and evaluting who and when did what.
    
    Solution?
Definition and adherence to the basic rules.

    Law no. 1 - Checksums must be always the same
    Law no. 2 - The network shall enable checksum verification
    Law no. 3 - The operating system has to verify the checksum

 

Checksums of file on the user's device = Checksums of file issued by author SW

 

 

The Three Laws of Cyber Security

Control Server

The principle of verification

kontrola has24