The Next 50 Years of Computer Security

Use Netsparker


There’s an interesting audio file about the next 50 years of computer security, it’s from a talk Alan Coxa a fellow at Red Hat Linux gave recently at the European OSCON.

It talks about the implementations of modularity, trusted computing hardware (we are already seing this in part, hardware anti-virus implementations and DRM to be built into CPUs), ‘separation of secrets,’ and overcoming the challenge of users not reading dialog boxes, will be crucial milestones as we head on to the future. He states: “As security improves, we need to keep building things which are usable, which are turned on by default, which means understanding users is the target for the next 50 years. You don’t buy a car with optional bumpers. You can have a steering wheel fitted if you like, but it comes with a spike by default.” All of this has to be shipped in a way that doesn’t stop the user from doing things.

Security and validation are critical issues in computing, and the next fifty years will be harder than the last. There are a number of proven programming techniques and design approaches which are already helping to harden our modern systems, but each of these must be carefully balanced with usability in order to be effective. In this talk, Alan Cox, fellow at Red Hat Linux, explores the future of what may be the biggest threat facing software engineers, the unverified user.

Of course security is always a balance between usability and actual security, the more secure something is, generally the less usable it becomes and vice versa, imminently usable…totally unsecure.

What else do you think is going to happen? For better or worse..

Source: IT Conversations

Posted in: Hacking News

,


Latest Posts:


NetBScanner - NetBIOS Network Scanner NetBScanner – NetBIOS Network Scanner
NetBScanner is a NetBIOS network scanner tool that scans all computers in the IP addresses range you choose, using the NetBIOS protocol.
Metta - Information Security Adversarial Simulation Tool Metta – Information Security Adversarial Simulation Tool
Metta is an information security preparedness tool in Python to help with adversarial simulation and assess security defense preparation and alerts.
Powershell-RAT - Gmail Exfiltration RAT Powershell-RAT – Gmail Exfiltration RAT
Powershell-RAT is a Python-based Gmail exfiltration RAT that can be used a Windows backdoor to send screenshots or other data as an e-mail attachment.
SCADA Hacking - Industrial Systems Woefully Insecure SCADA Hacking – Industrial Systems Woefully Insecure
It seems like SCADA hacking is still a topic in hacker conferences, and it should be with SCADA systems still driving power stations, manufacturing plants etc.
airgeddon - Wireless Security Auditing Script airgeddon – Wireless Security Auditing Script
Airgeddon is a Bash powered multi-use Wireless Security Auditing Script for Linux systems with an extremely extensive feature list.
Acunetix v12 - Pause & Resume Acunetix v12 – More Comprehensive More Accurate & 2x Faster
Acunetix, the pioneer in automated web application security software, has announced the release of Acunetix v12 - more comprehensive, accurate & 2x faster.


2 Responses to The Next 50 Years of Computer Security

  1. Someone May 11, 2006 at 7:33 am #

    What is going to happen over the next 50 years? General purpose computing will be less general. More appliances, one for gaming, one for media, one for communication and so on. We still have General purpose computers but their adoption in society would be less frequent.

  2. Navaho Gunleg May 14, 2006 at 1:02 pm #

    Yeah, I have to agree with Someone, there will be more different devices for specific uses.

    I also expect that, internally, these appliances shall still be general-purpose capable, so to speak. However, Digital Restriction Management and/or sneaky EULA’s (which by itself are Digital Restriction-tools, too), or too extreme ‘cyber’-laws will prevent the hackers (in the positive sense) to crack the appliances open and see how it works, to improve it or to add the functionality that we want and share the information.

    An otherwise so innocent and intellectually challenging an experience will become ‘illegal’ and make one an instant criminal. (In contrast: the whole Industrial Revolution wouldn’t have been possible if there weren’t any people tinkering with other people’s inventions, aiming to improve and secure things.)

    Heck, maybe it’ll even be impossible to open these appliances by embedding them in some type of epoxy that is impossible to remove without harning the device.

    That’s the more sadder route that events could take — future might show us we have been priviledged to live in current times…